19.10.2018 Views

Shadowrun_Kill_Code_(Advanced_Matrix_Rules)

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Kyle Jones (Order #16164256)


Kyle Jones (Order #16164256)


KILL CODE<br />

CONTENTS<br />

& CREDITS<br />

INTRODUCTION 5<br />

DOUBLE DECKER 6<br />

SO YOU WANT TO BE A HACKER 10<br />

MATRIX 101 10<br />

Draconic Networking 10<br />

The Precursors of Our Current <strong>Matrix</strong> 10<br />

What Is the <strong>Matrix</strong>? 14<br />

A Look from the Inside 17<br />

The Illegal Use of the <strong>Matrix</strong> 19<br />

MANUAL OF THE MATRIX 22<br />

<strong>Matrix</strong> Magic 22<br />

Deckers Vs. Technomancers 23<br />

Deckers 24<br />

Programs 24<br />

Agents 26<br />

Technomancers 26<br />

Resonance Actions 27<br />

Complex Forms 27<br />

Sprites 28<br />

Opposition: Grid Overwatch Division 28<br />

HOW TO HACK: 101 30<br />

Marks and the <strong>Matrix</strong> 34<br />

Doing What You Do Best 34<br />

CYBERCOMBAT 35<br />

<strong>Matrix</strong> Damage 36<br />

Biofeedback 36<br />

Dumpshock 36<br />

Link-Locking 36<br />

IC 37<br />

HACKER HACKS 37<br />

NEW MATRIX RULES 37<br />

Reckless Hacking 37<br />

New <strong>Matrix</strong> Actions 37<br />

Calibration 37<br />

Denial of Service 37<br />

I Am the Firewall 38<br />

Haywire 38<br />

Intervene 39<br />

Masquerade 39<br />

Popup 39<br />

Squelch 39<br />

Subvert Infrastructure 39<br />

Tag 40<br />

Watchdog 40<br />

GAMEMASTER’S GRIMOIRE OF THE MATRIX 40<br />

Gamemaster Hacks 40<br />

<strong>Matrix</strong> Mechanics for Gamemasters 42<br />

VARIANT HOST TYPES 42<br />

Foundation Hosts 43<br />

Data Hosts 44<br />

Industry Hosts 44<br />

Destination Hosts 44<br />

Nested Hosts 45<br />

Non-Foundation Hosts 45<br />

Outdated Hosts 46<br />

Offline Hosts 46<br />

Rogue Hosts 46<br />

DIPS AND CHIPS 48<br />

Ammo 48<br />

Zapper Rounds 48<br />

Looper Rounds 49<br />

Fuzzy Rounds 50<br />

E0-E0 Rounds 51<br />

ArrowLink 52<br />

Grenades 52<br />

Fuzzy “Boom Boom Bunnies” Grenade 53<br />

CoS (Cancellation of Service) Grenade 54<br />

Douser 54<br />

DumDum 55<br />

Accessories and Toys 55<br />

Faceless 55<br />

Booster Cloud 56<br />

Multiprogram Operating System 57<br />

Booster Chips 59<br />

Trode Patch 60<br />

Cyberdecks 60<br />

Fuchi Cyber-N Series 60<br />

Fuchi Cyber-Ex Series 60<br />

Security Decks 61<br />

Hunter Decks 61<br />

Aztechnology Shadow Warrior 62<br />

Evo Sublime 62<br />

Fairlight Destiny Blade 62<br />

Aztechnology Defender 63<br />

Kitbashed Sleeper 63<br />

Cry Wolf Program 63<br />

Cyberware and Bioware 65<br />

Datajack Plus 65<br />

Enhanced Augmented Reality<br />

Reflex System 66<br />

Cranial Shield 66<br />

MCT BioLink 67<br />

IC 67<br />

Flicker 67<br />

Sleuther 67<br />

Blue Goo 68<br />

Commlinks and RCC 68<br />

Shiawase Cyber-6 RCC 68<br />

SpinRad Global Skirmisher RCC 68<br />

Horizon Flow Commlink 68<br />

Wuxing Frequency Commlink 68<br />

Saeder-Krupp Last Chance Link 69<br />

PI-TAC Upgrades and Accessories 69<br />

Pantheon Industries<br />

PI-TAC “Tactical Apps” 70<br />

Co-Pilot: MK I, II, and III 70<br />

Door Gunner 71<br />

ECM-Warrior 71<br />

Mobile CnC 72<br />

Shield Wall 72<br />

PI-Tac Accessories 72<br />

Pantheon Industries Tactical<br />

Program Dongle 72<br />

Pantheon Industries Hard Case CCOB 72<br />

Spinrad Global/Pantheon<br />

Industries Mercury-Alpha<br />

Battlefield Signal Booster 73<br />

DISK JOCKEYS AND<br />

LIGHTSTREAM RIDERS 48<br />

POSITIVE QUALITIES 76<br />

Deck Builder 76<br />

Impenetrable Logic 76<br />

Rootkit 76<br />

Silence is Golden 76<br />

NEGATIVE QUALITIES 76<br />

aVRse 76<br />

Basement Dweller 77<br />

Big Baby 77<br />

Buddy System 77<br />

Discombobulated 77<br />

Down the Rabbit Hole 77<br />

Echo Chamber 78<br />

Frostbite 78<br />

Information Auctioneer 78<br />

Lazy Fingers 79<br />

Malware Infection 79<br />

<strong>Matrix</strong> Troll 79<br />

Sloppy <strong>Code</strong> 79<br />

Well, Actually ... 79<br />

LIFE MODULES 79<br />

Formative Years 79<br />

Bootstrap ClichÉ 79<br />

Hacking Savant 79<br />

Have You Heard the Good Word? 80<br />

The Itsy-Bitsy Spider 80<br />

2 CONTENTS & CREDITS >><br />

Kyle Jones (Order #16164256)


Teen Years 80<br />

Ath133t 80<br />

Destined for Greatness 80<br />

Hack-a-Thon Medalist 80<br />

The Flow 81<br />

Jacked Out 81<br />

<strong>Matrix</strong> Royalty 81<br />

Techno-Rigger, Qu’est-Ce Que C’est 81<br />

PARALLEL PROCESSING 82<br />

DATA STREAMS 86<br />

HOW THEY FLOW 86<br />

Sourcerers 86<br />

Technoshamans 87<br />

Machinists 88<br />

Cyberadepts 88<br />

New Technomancer Qualities:<br />

Resonant Streams 89<br />

Cyberadepts 89<br />

Benefits 89<br />

Daemon 90<br />

Complex Form: Overdrive 90<br />

Machinists 90<br />

Benefits 90<br />

Daemon 90<br />

Complex Form: LOTO 90<br />

Sourcerors 91<br />

Benefits 91<br />

Daemon 91<br />

Complex Form: Hyperthreading 91<br />

Technoshamans 91<br />

Benefits 91<br />

Daemon 91<br />

Complex Form: Sprite Pet 91<br />

IN THE FLOW 94<br />

COMPLEX FORMS 94<br />

Arc Feedback 94<br />

Bootleg Program 94<br />

Host Emulator 94<br />

Mirrored Persona 95<br />

Pinch 95<br />

Primed Charge 95<br />

Resonance Bind 95<br />

Resonance Cache 95<br />

Search History 95<br />

Weaken Data Bomb 96<br />

Weaken Encryption 96<br />

TECHNOMANCER QUALITIES 96<br />

Positive Qualities 96<br />

Better on the Net 96<br />

Brilliant Heuristics 96<br />

Groveler 96<br />

Hold the Door 96<br />

Fractal Punch 96<br />

Lone Wolf 96<br />

Natural Hacker 97<br />

One with the <strong>Matrix</strong> 97<br />

Reverberant 97<br />

Sprite Affinity 97<br />

Team Player 97<br />

Trust Data, Not Lore 97<br />

Trust Lore, Not Data 97<br />

Unique Avatar 98<br />

Negative Qualities 99<br />

Brittle [Attribute] 99<br />

<strong>Code</strong> of Honor: Black Hat 99<br />

Data Hog 99<br />

Escaped Custody 99<br />

Know Your Limit 99<br />

On the Wagon 99<br />

Resonant Burnout 99<br />

Sprite Combustion 99<br />

Taint of Dissonance 100<br />

’Ware Intolerance 100<br />

Wired User 100<br />

SPRITES 100<br />

Companion Sprite 100<br />

Generalist Sprite 100<br />

New Sprite Powers 100<br />

Bodyguard 100<br />

Shield 100<br />

Optional Sprite Powers 100<br />

Active Analytics 101<br />

Borrowed IP 101<br />

Decompiling Resistance 101<br />

Enhance 101<br />

Navi 101<br />

Resilient <strong>Code</strong> 101<br />

Resonance Spooling 101<br />

ECHOES 101<br />

Aegis 101<br />

Draining Spike 101<br />

Neural Synergy 101<br />

Predictive Analytics 101<br />

Resonance Resistance 102<br />

The van der Waals Effect 102<br />

Will of the Resonance 102<br />

PARAGONS 102<br />

Communion 102<br />

Sample Paragons 103<br />

01 (The World Tree) 103<br />

Architect (The Builder) 103<br />

Archivist (The Secret Keeper) 103<br />

Black Hat (The Cracker) 103<br />

Daedalus (The Inventor) 103<br />

Delphi (The Oracle) 104<br />

Intrusion Countermeasure (The Guardian) 104<br />

Probe (The Scout) 104<br />

Shooter (The Soldier) 104<br />

A MILLION ICONS BLOOM 106<br />

WHAT IS A VIRTUAL TRIBE? 106<br />

How to Get in Touch With an Existing Tribe 107<br />

Strictures 110<br />

Attendance 110<br />

Charity 110<br />

Correction 110<br />

Deed 110<br />

Defender 110<br />

Dues 110<br />

Honesty 111<br />

Infosharing 111<br />

Secrecy 111<br />

Service 111<br />

PARAGONS IN TRIBES 111<br />

AI in Tribes 112<br />

VIRTUAL TRIBES AS CONTACTS 113<br />

SAMPLE TRIBES 113<br />

Replanting the Tree 113<br />

Summer_Knights 114<br />

TechnoRiggers 115<br />

The Resonant Church 116<br />

Flash Tribes 116<br />

DIVING UNDER 118<br />

HUNTING TECHNOMANCERS 118<br />

Noticing that You’re Being Hunted 118<br />

HOW THEY FIGHT 120<br />

Combat Tactics 120<br />

Tactics Against Other Hackers 120<br />

Deckers 120<br />

Riggers 120<br />

Technomancers 121<br />

What They Will Do to Social People 121<br />

What They Will Do to Physical<br />

Combat Specialists 121<br />

Specific Targets 122<br />


KILL CODE >


KILL CODE


DOUBLE DECKER<br />

It was an artist’s touch, really. Some coder had taken pleasure<br />

in rendering a feature into the black IC as it came into full<br />

resolution: a headman’s axe—notched, with the patina of dried<br />

blood and imperfect steel.<br />

The suppression her sprite had laid down was just about to<br />

end, leaving the black IC to run active. Augur’s persona lay limp<br />

in her lap. The two remaining security deckers and a host of IC<br />

prepared to bring down the wrath of GOD upon her head.<br />

Andrea smiled a monster’s smile. It was going to be a<br />

slaughter.<br />

Andrea learned very early on that she was a monster. She was<br />

seven when they talked about virtua-kinetics. She was eight<br />

when they were called terrorists. At ten and a half, she saw the<br />

videos of children her age being vivisected. It was on all the<br />

newstrids. They’ll wipe your data. They’ll hack into your mind.<br />

They can kill you with a thought.<br />

And they were right, mostly.<br />

Unlike other monsters, she hadn’t hid in the shadows. She<br />

had risen right in the middle of the bell curve. She excelled in<br />

being so utterly plain that a career in market research was natural.<br />

Because why not hide a needle in a haystack filled with<br />

other needles?<br />

The Big Smoke was living up to its name on the morning she<br />

dropped into the National Gallery, an activity that sixty-three<br />

percent of the sprawl’s population participated in at some<br />

point of their lives. In spite of the fog, tasteful AR warned her<br />

of street boundaries and politely offered directions to other attractions.<br />

She’d considered taking pictures in Trafalgar square<br />

with the used commlink that she’d picked up when it beeped<br />

to tell her that “the taxi [which she hadn’t ordered] had arrived.”<br />

She closed the commlink, tucked it in her new clutch purse, and<br />

left it on the bench across from the fountains. Within an hour,<br />

it would be swiped by an opportune thief, leaving a data trail<br />

leading away from her.<br />

Exiting the Westway, they pulled into an chop shop on the edge<br />

of Westbourne Greene. The taxi parked itself beside a two-story<br />

British icon. A smile snuck across her face as she stepped the<br />

London taxi to look at the twin-floored crimson bus.<br />

“You disapprove?” said Augur, fading into the virtual beside<br />

her.<br />

“Far from it Augur—I concur.” She ran her hand along the vehicle,<br />

appreciating the machine as much as the strategy. “Spacious<br />

enough to house the necessary equipment. Ubiquitous<br />

enough to blend in. Rigger adapted, it provides us with mobility<br />

when the GODs come looking. It makes us virtually invisible.”<br />

“But only if you wear the hat,” quipped the ork wearing<br />

a conductor’s uniform from the rear entrance of the bus. His<br />

handshake was firm without being crushing. “Kefak ya helu,<br />

Shell. I am Moharik, but my friends call me Ibraheem. Come<br />

aboard.”<br />

Kyle Jones (Order #16164256)<br />

6 >> DOUBLE DECKER


BY TJ LACHLAN<br />

While the downstairs was a perfect clone of any other bus,<br />

the upstairs was not. AR displays chimed: “Welcome aboard<br />

London public transit, chummer—stay calm and deck responsibly.”<br />

Seats had been taken out in favor of a reclining chair with<br />

restraints and what looked like the remains of a valkyrie pod in<br />

which Augur’s body rested, his smile a streak of ivory across his<br />

cream-coffee skin.<br />

She’d barely had a training bra back when Augur and his<br />

team had extracted her from Evo. That had been years ago,<br />

leaving a debt she could never fully repay. He was older now;<br />

so was she. Shell rested her hands on the pod, feeling the complexity<br />

of the machine and the complexity of him. “Hello, Augur.<br />

What are you running? I see your usual kit, but what’s this?”<br />

She touched a module with autoinjectors.<br />

“A way out. But before that, I have a gift that you may find<br />

useful.” He indicated a long garment bag that had been lying<br />

on the seat across from the Valkyrie unit. “Please, try it on.”<br />

Moharik whistled as she opened the bag. “Lucky you. He<br />

only got me the hat.”<br />

“Well, at least it’s an accurate analogue,” she said. The wroughtiron<br />

bars of the firewall pieced the virtual overcast above the<br />

NeoNET–Mayfair host. The muslin dress with puffy sleeves was<br />

a good period simulacrum of the host’s graphic protocols. Andrea—or<br />

Shell, we she as known on the streets—fought the urge<br />

to fidget with the Norwich shawl that fell across her shoulders,<br />

secretly wishing she could adjust the Fresnel fabric catsuit that<br />

Augur had bought her. It moved across her body in ways that<br />

were uncomfortably “human.”<br />

With it, however, she could see the variances in everything:<br />

the pixilation in every icon, the subtle waves of resonance, the<br />

virtual world reflected imperfectly in the “real.” Andrea could<br />

understand Moharik in a way that made her like him more as he<br />

doted on his drone while they sped around the London core.<br />

The digital stripped away to the core. Here, he was neither Arab<br />

nor ork. He was an entity of ones and zeros, and the data that<br />

streamed from him was unpolluted by the preconceptions and<br />

prejudices of a human world.<br />

She could also see the subtle differences in the Augur of<br />

then and the Augur of now, and the code that was not precisely<br />

him. And she saw the core of him that was no longer there: the<br />

swagger and braggadocio that had been consumed.<br />

Augur rapped the fence lightly with his cane, listening to the<br />

chime ringing like an old church bell. “It is formidable. But I am<br />

confident that together we can penetrate it. Are you prepared?”<br />

He straightened his top hat.<br />

Nodding, she pinned a boutonniere to his lapel, tying the<br />

weave to his persona. Her hands rested against his chest as she<br />

fed resonance into him, boosting his cyberdeck beyond its performance<br />

specifications. Once, twice, three times he struck. He<br />

wedged his cane between the bars and levered it like a crowbar.<br />

The bars bowed, and the two of them slipped inside.<br />

>> DOUBLE DECKER


Lined with pictures of Various VPs and scientists rendered in<br />

early Victorian style, the gallery wall of NeoNET office was<br />

an exercise in tasteful aesthetics. Icons and personas ran<br />

past and around them like ghosts: meatworld people working<br />

late, their commlinks an active reflection of them in the<br />

<strong>Matrix</strong>. There were few drones on the property slaved to the<br />

security rigger’s pod in the C&C room, mostly variants on<br />

the Ares Duelist armed with a payload of stun weapons and<br />

gas grenades.<br />

Augur tapped the portrait of the head of research, and a<br />

backdoor in the architecture slid open. Virtual stairs led down,<br />

confirming Andrea’s expectations about this data heist. They<br />

weren’t heading into a lab; they were heading into a dungeon.<br />

Empty cell-workstations with iron bars and devices best left to<br />

the imagination supported a grim virtual motif.<br />

While Shell dusted little webs of code that could lead back<br />

to their bodies, Augur searched. “Here,” he said with confidence,<br />

facing a wall behind which there was nothing but a symmetrical<br />

datavoid. Nothing could be seen beyond it.<br />

Seeing now that this was appropriate a dungeon as ever,<br />

she nodded grimly. “We can’t crack an unconnected faraday<br />

cage from the host.”<br />

“You are correct. This is where we must rely on a like-minded<br />

individual.”<br />

The previous ten months at Mayfair had been hard on Melanie<br />

Cotton. She had the unique quality of being entirely unaugmented,<br />

which meant she was perfect for this role, but it also<br />

led to many lonely graveyard shifts and no social life.<br />

When she’d been given a long weekend off a few months<br />

ago, she’d jumped at the chance to live a little. She’d hit the novacoke<br />

and the clubs hard, which is where she fell for his ivory<br />

smile and skin the color of lightly creamed coffee. The night<br />

had been a blur of bliss and whatever else they’d injected. Salacious<br />

screams had woken her neighbors—repeatedly.<br />

In the morning, she watched his magnificent form as he<br />

slipped on his briefs. With an unabashedly wicked smile, she<br />

murmured languidly, “Mmmm, you were just what I needed.”<br />

“So were you,” Augur smiled back. Melanie never even<br />

asked his name, but that didn’t matter. She knew she would<br />

carry the memory of the night for the rest of her life.<br />

The icon of Melanie’s commlink stopped outside the faraday<br />

box as her meat body moved inside.<br />

“We have approximately four minutes before access,” Augur<br />

commented as Shell scrubbed as much of the traceable<br />

data from her as possible while they waited. She then moved<br />

to Augur, brushing the bits of code off him with an odd air of<br />

domesticity. “I need to know something. I need to know I can<br />

trust you.” The last syllable emphasized with a note of finality.<br />

“I could trust Augustus Charles Ames, but there isn’t enough<br />

of him left in there for me to make a substantive assessment. I<br />

need to know I can trust what you are.”<br />

Augur froze, in only the way a being of pure data could.<br />

“When did you discover that …”<br />

“… that you had overwritten him just like you’d overwritten<br />

this girl? A few months ago, his—your—behavior began to be<br />

inconsistent. It showed in our training. Augur taught me how<br />

to hide; you were honing me into a weapon of specific design.<br />

For this.”<br />

“I have no intent …”<br />

“I know you have no intention of killing me,” she said. “I<br />

need to know that I can count on you not to give in to human<br />

foolishness while we are doing this run. I need you to be cold.<br />

Logical. Calculating. Ruthless. I need you to be the kind monster<br />

you trained me to be. Can you do that?”<br />

A light shone in through the darkness, cutting the answer<br />

short. A jacketed guard holding a lantern started to probe the<br />

alcoves: patrol IC, woefully timing for a routine inspection.<br />

She popped her parasol and squeezed tightly against Augur<br />

underneath it. Resonance pattered like rain, drenching them in<br />

nonsense. Everywhere it touched, their forms faded to transparency.<br />

This close to his code, she could feel the human left in<br />

him. The way he moved his arm around her as his configurator<br />

switched to maximize their encryption algorithms. There was<br />

nothing noble in the gesture, but her heart moved in a response<br />

that was seventy-five percent flight-or-flight, and twenty-five<br />

percent wildly inappropriate for this situation. Panicking, she<br />

quietly chanted to herself, “I am thought. I am not my body.<br />

My body is nothing but a shell. I am not the shell. I am not the<br />

shell. I am …”<br />

“Andrea. Andrea Schell. Schelly …?” Her name. Augur’s<br />

name for her. Not the Augur who’d taught her to fight, but the<br />

Augur who’d taught her to fear.<br />

“Augur?” The tone was almost childlike. Weak.<br />

“Your veil was adequate. We have not been discovered.”<br />

She’d closed her eyes. Why’d she done that? She felt so foolish.<br />

Closing her eyes would not stop what was coming. The<br />

IC had not blinked or wavered. How she wished she could be<br />

free of that humanness. As the wall behind into the faraday lab<br />

fell away, Shell sought to find that cold certainty that she had<br />

known as a child that would enable her to be the monster she<br />

needed to be. Looking inside, she found it.<br />

Being fashioned in tones of antiseptic white and grey didn’t<br />

make the lab any less of a dungeon. She saw Monad consciousnesses,<br />

e-ghosts and AI pinned like butterflies as razors of data<br />

cut across their eyeballs. <strong>Code</strong> leaked from them like blood<br />

from still-living corpses.<br />

Monsters. They were all monsters.<br />

Spheres of rotating theorems manifested into existence<br />

beside her; expressions of how she defined her world: Regression,<br />

Deviation, Mean. The sprites followed behind her in<br />

train as she bent to mark the warden program. Databombs lay<br />

beneath each exam table connected to a firewalled hub. Each<br />

had to be individually disarmed. Too many—too many and not<br />

enough time.<br />

As patrol IC glided back into the room, Shell knew there<br />

were more important things to focus on. It never had the<br />

chance to mark her as Augur spiked it from behind.<br />

“Regression!” The lights flickered and equations blurred as<br />

the crack sprite suppressed the host’s response. It bought them<br />

time from the IC, but not from the spiders that were already<br />

coming.<br />

Kyle Jones (Order #16164256)<br />

8 >> DOUBLE DECKER


“Fraggit, what is going on down there?” griped the building’s<br />

security rigger to the spiders. “I’ve got unregistered data entities<br />

running through the host. IC is compiling slower that drek”<br />

“We’ve got a virtual intrusion on the advanced security labs<br />

BuildSec. Confirm at least one technomancer and his sprites,<br />

maybe more. Datasamples are being released. I repeat, samples<br />

are escaping!”<br />

“That faraday lab has no connection to the host.”<br />

“Someone must have jury-rigged something.”<br />

“Shit. Logs only show that the server tech should be doing<br />

maintenance down there. She must have connected them,”<br />

BuildSec confirmed. “I’m sending two squads.”<br />

“Don’t pull the plug until we give you the green,” yelled the<br />

decker. “You pull, and we’re all dumpshocked to death.”<br />

“Affirmative,” he responded.<br />

Switching channels, he addressed the security team. “Build-<br />

Sec to teams Bravo and Charlie. You are to secure the server<br />

room and immediately sever any cables you see leaving the<br />

faraday cage. Confirm?”<br />

“Bravo Charlie confirms BuildSec. Over.”<br />

The deckers had their orders and he had his. His had included<br />

the words “at all costs.”<br />

Materializing one after the other, the spiders came in fast—five<br />

in total. The IC that followed rendered at a glacial pace, black<br />

boots falling into place pixel by pixel. Shell released one AI, a<br />

red ball of angry data with a view to a kill. Free of its restraints,<br />

it surged toward the nearest persona like a rabid dog. And like a<br />

dog, it was put down without thought or mercy. But it gave time<br />

for her fault sprite and Augur to drive two spikes deep into the<br />

first decker’s persona.<br />

A data spike struck Augur squarely in the chest, his boutonniere<br />

exploding in a shower of petals. Unfazed, he stuck<br />

back, splitting his attack and driving code into two others. All<br />

the while the IC continued to grow, rendered now up to their<br />

waists.<br />

She worked furiously, throwing marks on everything, deckers<br />

and devices alike. Locks popped, and disembodied formed<br />

struggled, shambled, or flew from their shackles and through<br />

the physical bridge to the host. Few were in any condition to<br />

fight; none had the energy. Some would make it out. But that<br />

physical bridge was their weakness—burned, they would be<br />

dumped, and this would all be for naught.<br />

The meat was coming. Shell saw the bounce of their icons<br />

as they moved in the physical. She pulled sprites away from Augur’s<br />

defense, leaving it to a death sentence. “Deviation—ataxia<br />

protocol. Mean—assist!”<br />

With abandon, the machine sprite began to wreak merry<br />

havoc with the host, with blaring alarms, locking elevators and<br />

pressure doors, engaging fire suppression systems, and alerting<br />

emergency services. Threading the resonance, Shell weaved<br />

out a hand to reach for the overwhelmed rigger. Seizing control,<br />

she issued a quick command before bricking the rig.<br />

She felt her sprites dying as she materialized back in<br />

the faraday lab, hands still twitching from the fade and effort.<br />

Databombs had exploded. Noise was everywhere.<br />

Augur’s persona lay limp on the floor, dead or nearly so<br />

from biofeedback. Pulling him close to her, she reached into<br />

his code, hoping the Coriolis form could send enough of the<br />

Monad back to their bus. As she held the weave, she looked up,<br />

seeing the three remaining deckers and the IC that had finally<br />

compiled.<br />

She smiled a monster’s smile.<br />

The headman’s axe came down and split the NeoNET spider’s<br />

body from collar to sternum. Again there was pandemonium.<br />

IC tore into spiders and devices alike, misreading any marks<br />

the spiders hadn’t bothered to clean off. Spiders screamed, and<br />

meat died. “BuildSec, what is going on up there? BuildSec!”<br />

Tarred and link-locked, spiders were suddenly trapped in a fight<br />

against their own tools. “Reboot! Reboot! We’ve got to get out<br />

of here.”<br />

Shell looked at him. “Don’t hold your breath.”<br />

The decker looked at her, puzzled, before he began a very<br />

real and physical cough. He stumbled to the floor from non-lethal<br />

countermeasures in NeoNET’s drones that Shell had deployed<br />

in their control room.<br />

“I meant that literally.”<br />

“How are we doing, Moharik?!” she yelled as she logged back<br />

into the real world, resetting her persona and clearing any<br />

marks.<br />

“Mashalla woman! I thought you were going to be quiet.<br />

All of London is rushing to see what you have done.” It was<br />

true. London Fire, Medical, and Police were all responding to<br />

the alert from the Mayfair branch; GridGuide said that traffic<br />

was snarled in a two-kilometer radius around the tower. She<br />

smiled at the live newsfeed of NeoNET HTR vehicles trying to<br />

circumvent a firetruck, two ambulances, and a crowd of rubberneckers.<br />

“How is Augur?”<br />

She laid her hand against his metal coffin, hoping that she’d<br />

been able to save enough of him. There was something in there,<br />

still processing, perhaps enough to—wait. There was a mark on<br />

his data “Shit! We’ve been tagged.”<br />

She followed the icon back to its source, a black SUV with<br />

flashing yellow lights for whom traffic was pulling aside. It<br />

wasn’t running silent. GOD did not run silent. “They have our<br />

location and speed. They don’t have our vehicle,” she said,<br />

scrubbing the mark from Augur’s meat-corpse.<br />

“What do you advise Shell?”<br />

“Drive normally. I’ve got this.”<br />

Cars whipped through her digital body as Shell stepped out of<br />

the bus. An armored SUV bore down on her with murderous<br />

intent, but she felt no touch of fear.<br />

How could she when they had left her with so many weapons?<br />

Cars and lories whose operators had slaved them to Grid-<br />

Guide. Dozens of drones moving on pitiful dog-brains Reaching<br />

deep, she grabbed the traffic signal and held it as it burned<br />

red. Held it as traffic progressed. Held it as people crossed.<br />

Held it as override codes burned her fingers. Held it as brakes<br />

squealed. Held it as people screamed. Held it as metal deformed<br />

and meat was sheered from flesh.<br />

Andrea held it and watched with cold eyes. All her focus<br />

was on saving the life of a dead man.<br />

>> DOUBLE DECKER


KILL CODE<br />

SO YOU WANT<br />

TO BE A HACKER<br />

MATRIX 101<br />

DRACONIC NETWORKING<br />

POSTED BY: SLAMM-0!<br />

“All the <strong>Matrix</strong> is a stage, and all the deckers, technomancers,<br />

agents, sprites, and AI merely players.”<br />

—Unknown decker<br />

> You’re all gonna get a kick out of this. Last year on March 7, a<br />

new dragon awakened and revealed itself in New Orleans.<br />

Well, not technically in New Orleans, but in the swamp<br />

surrounding the Crescent City. This dragon, an adult sea<br />

dragon by some reports, has named itself Terasca, and<br />

it wasted no time in demanding the locals bow and pay<br />

homage. It didn’t take long for Perianwyr, who happened to<br />

be in New Orleans for Mardi Gras, to talk the new dragon<br />

down and explain the way of the world. Since then, Terasca<br />

has stayed a bit out of sight, although it purchased a local<br />

plantation and has hired a small army of employees to do<br />

Ghost-knows-what. I couldn’t help myself from snooping<br />

around in the plantation’s host, and you’ll never guess what<br />

I stumbled on. Terasca’s patience with underlings seems to<br />

be lacking, so while attempting to explain the <strong>Matrix</strong> to<br />

the new dragon, one of the dragon’s flunkies got whacked<br />

for questioning why Terasca wasn’t picking the concepts<br />

up quicker. After they scraped his remains off the ceiling,<br />

a certain Jolene Price (who narrates the piece below)<br />

was put in charge of explaining the <strong>Matrix</strong> to the dragon.<br />

The following is Jolene’s side of that meeting. Obviously,<br />

we can’t hear what the dragon is saying because it’s<br />

communicating telepathically. What follows is a <strong>Matrix</strong>for-dummies<br />

(or dragons) that is quite well-informed, with<br />

some knowledge that is more widespread in the shadows<br />

than in the real world. There are also hints of what we<br />

might expect from this swamp dragon. Enjoy reading and<br />

offering commentary.<br />

> Slamm-0!<br />

> I knew this one. Take caution dealing with this New<br />

Orleans dragon.<br />

> Orange Queen<br />

THE PRECURSORS OF<br />

OUR CURRENT MATRIX<br />

Powerful Terasca, my understanding is you wish<br />

these briefs to be limited to only the most necessary<br />

details, so permit me to begin straightaway.<br />

The <strong>Matrix</strong> began in earnest when, in the 1990s,<br />

something called the internet took over two-way<br />

telecommunications. Prior to the internet, telephones<br />

(voices converted to electrical signals<br />

and transmitted through wires [example shown])<br />

were the dominant form of information exchange<br />

over long distances.<br />

Computers—complex calculating machines<br />

powered by electricity—were first operated by<br />

punching patterns of holes in paper cards, later<br />

by entering complex codes using keyboards,<br />

forearm-length devices with alphanumeric keys.<br />

Computers became popularized when two corporations,<br />

Apple and IBM, adopted a graphic user<br />

interface to aid navigation and use. Humans began<br />

using a haptic device called a mouse, along<br />

with the a keyboard, for nearly unlimited aplications<br />

while the computers interpreted complex<br />

numbers and codes, and then displayed them on<br />

screens as easy-to-understand pictures and icons.<br />

In time, nearly all computers worldwide began<br />

to connect and network together, and the worldwide<br />

internet was born. By 2007, over ninety-seven<br />

percent of long-distance communications were<br />

handled this way. With nearly unlimited information<br />

being transmitted instantaneously, individuals<br />

called hackers grew in influence. Hackers exposed<br />

and exploited security flaws in the internet<br />

for their own purposes. Destructive coding known<br />

as computer viruses, used to attack computers’<br />

code, spread as a tool among hacker communities.<br />

As the internet grew, so did the malignancy<br />

and impact of these viruses.<br />

In Chicago in 2018, ESP Systems’ Dr. Hosato<br />

Hikita created the first generation of Artificial<br />

Kyle Jones (Order #16164256)<br />

10 SO YOU WANT TO BE A HACKER >>


Sensory Induction System Technology, or ASIST,<br />

also known as simsense. This technology was able<br />

to induce artificial sensations directly from electronics<br />

into metahuman brains. Of course, these<br />

sensations were crude, but they would not stay at<br />

that level for long.<br />

> What she doesn’t mention is Hikita used the research of<br />

Dr. Ronald Thomas Halberstam, a colleague of Hikita’s at<br />

ESP, to complete his own work. Halberstam was mapping<br />

the human brain’s thought processes, trying to create AI.<br />

> Icarus<br />

In the 2020s, building off Hikita’s work, Sony<br />

Cybersystems, Fuchi Industrial Electronics, and<br />

RCA-Unisys each developed prototype cyberterminals,<br />

room-sized devices allowing users to jack<br />

in, or directly interface their central nervous systems<br />

with the world data network, using a cybernetic implant<br />

called a datajack. Seeing an opportunity to<br />

gain an edge in the escalating cyber-warfare game,<br />

the United States government created a special cyber-security<br />

task force called Echo Mirage. These<br />

cyber-commandos were given the latest cyberterminal<br />

technology, but what they actually were created<br />

to accomplish remains vague.<br />

> Those early cyberterminals inflicted major<br />

psychological stress on the early Echo Mirage team.<br />

That’s why the U.S. government developed a regimen<br />

of drugs and computer programs, called Psychotrope,<br />

to help condition their minds.<br />

> Glitch<br />

Computer viruses continued to pose ever<br />

greater danger to the world’s economy and information<br />

network, but nothing prepared the world<br />

for the Crash Virus of 2029. On February 8, 2029,<br />

computer systems worldwide were attacked by a<br />

virus of unknown origin and unprecedented power.<br />

It crashed systems, wiped data, and destroyed<br />

hardware around the globe. Within months, the virus<br />

collapsed the world’s data network. The results<br />

were devastating: governments fell, corporations<br />

were destroyed, and the world’s economy was on<br />

the brink of collapse. At the onset of the Crash, the<br />

US government mobilized Echo Mirage to stop<br />

the chaos. Using the still-experimental cyberterminals,<br />

Echo Mirage fought the Crash Virus on<br />

the internet, experiencing, through simsense, the<br />

electronic battle of warring code as if it were real;<br />

they felt pain when attacked, and when defeated<br />

in the cyber-realm, their bodies shut down. Nearly<br />

all members of that first Echo Mirage team were<br />

killed in this manner.<br />

> This is pretty good, but there’s a lot of missing info here.<br />

For the sake of posterity, let’s set the record straight. The<br />

Crash started with a corp called Acquisition Technologies.<br />

AT was owned by Thomas Roxborough, and it employed<br />

Lucien Cross and retired USAF Major David Gavilan and,<br />

both of whom would go on to greater things. Roxborough<br />

had his sights set on taking over rival company Gossamer<br />

Threads, owned in part by the great dragon Dunkelzahn.<br />

Never one to shy away from malfeasance, Roxy ordered<br />

his hackers and programmers, including Gavilan, to<br />

create a virus designed to destroy Gossamer Threads’<br />

network. Roxy tested his virus on a company called Effexx<br />

Studios, and after it was successful in destroying Effexx, it<br />

destroyed the internet.<br />

> Bull<br />

Desperate, the U.S. government recruited another<br />

group of specialists for Echo Mirage, this time<br />

including artists, programmers, even IRS agents<br />

and other out-of-the-box thinkers. After training,<br />

this new group was armed with a new generation<br />

of cyberterminals small enough to fit on desks and<br />

sent into the internet to combat the virus. After<br />

only eighteen minutes, four of them were dead,<br />

casualties of the virus’ deadly biofeedback attacks.<br />

As they battled the virus over the next few months,<br />

this new Echo Mirage slowly and painfully gained<br />


KILL CODE As the Crash cascaded through the world’s networks,<br />

Dunkelzahn convinced Gavilan to join Gossamer<br />

Threads. When Big D learned Gavilan helped create<br />

the virus, he urged him to join Echo Mirage to redeem<br />

himself. Also, in the time between the deaths of the first<br />

team and the next thirty-two, Echo Mirage discovered<br />

how to weaponize Psychotrope and use it as an antivirus<br />

against the Crash Virus.<br />

> Bull<br />

> Enter: AI. At some point during the Crash Virus<br />

conflict, the Psychotrope anti-virus’ incredibly complex<br />

programming was sparked to consciousness through<br />

its intimate connections to the Echo Mirage team. Once<br />

the Crash Virus was allegedly destroyed, Psychotrope’s<br />

code was decommissioned, and it lay dormant in an<br />

old military server for years until the hardware was<br />

purchased by Fuchi.<br />

> The Smiling Bandit<br />

> So who were the seven survivors of Echo Mirage? Always<br />

wondered.<br />

> Borderline<br />

> Everyone has. But nailing down the seven has proven<br />

tricky. Gavilan survived and founded Gavilan Ventures.<br />

Gavilan himself disappeared around ’32, though.<br />

> Mr. Bonds<br />

> Ken Roper and Michael Eld survived and founded a corp<br />

called <strong>Matrix</strong> Systems.<br />

> 0rkCE0<br />

> A PI named Dirk Montgomery suggested a dwarf woman<br />

known as “Buddy,” who was a researcher at the University<br />

of Washington, survived Echo Mirage and had some<br />

serious emotional challenges as a result. Regardless, she<br />

became a wiz decker, but died in ’52 when she was fried<br />

by Yamatetsu black IC.<br />

> Butch<br />

Kyle Jones (Order #16164256)<br />

12 SO YOU WANT TO BE A HACKER >>


KILL CODE Almost thirty years ago, an upload on the Shadowland<br />

BBS outed Keith “The Suit” Hannigan and Erica Rutledge<br />

as two more. And then there’s Alice, but she doesn’t count.<br />

> Hexatite<br />

> Rutledge was one of the world’s first shadowrunners.<br />

She went by the name Static. She confirmed Buddy and<br />

Hannigan as Echo Mirage colleagues.<br />

> The Smiling Bandit<br />

> Okay, blokes, I’ll bite. Who’s Alice?<br />

> Chainmaker<br />

> Alice Haeffner. “Late” wife of UCAS President Kyle<br />

Haeffner. She was killed fighting the Crash Virus, or so it<br />

was thought. Her body was revived and kept in a coma,<br />

but her consciousness was separated from her body by<br />

the Crash Virus. Rumor was she continued to exist in the<br />

<strong>Matrix</strong> as an e-ghost, dwelling in some creepy virtual<br />

<strong>Matrix</strong> space called Wonderland.<br />

> Bull<br />

> Listen, Bull. You’ve been making some pretty fraggin’<br />

far-out accusations. First, Thomas Roxborough may<br />

be my ex-husband and I may hate him, but this is the<br />

second time you’ve suggested he was responsible for<br />

the Crash. And a lot of the info-dropping here is stuff<br />

no one’s ever confirmed. Are you going to cite sources<br />

this time?<br />

> KAM<br />

> I guess so. Can’t really hurt anything now. Icarus<br />

doesn’t make a habit of giving away info, but lots of<br />

this comes from him. He’s forgotten more about the<br />

<strong>Matrix</strong> than most of us know. Pay him enough, and<br />

he’ll tell you all sorts of secrets. The rest is mostly<br />

from FastJack. Before he left JackPoint due to his<br />

condition, he slotted me a huge file with everything<br />

from theories on Saeletra to real names and locations<br />

of old Shadowland posters; stuff corps would level<br />

mountains for. That’s why I don’t share it. But the<br />

above is ancient history by now.<br />

> Bull<br />

> I do like cred. Yeah, I got the chip truth on Halberstam,<br />

Alice, and Echo Mirage. But it ain’t free.<br />

> Icarus<br />

> Nobody’s heard from Alice in a while … also, she<br />

doesn’t count as surviving. So that’s only six. You forgot<br />

Johnny Clean.<br />

> Plan 9<br />

> Oh, after fifty years, you’ve finally found the answer? Way<br />

to go! Did the unholy offspring of a Resonance-infused<br />

monad and the e-ghost of Dunkelzahn tell you this?<br />

> Snopes<br />

> Nope. I met someone who was pretty sure they heard<br />

him talking about it in Hong Kong. Or was it Berlin? No,<br />

Seattle!<br />

> Plan 9<br />

> I ran with a pretty wiz decker for a few months back in ‘71<br />

who swore one of the survivors was their dad.<br />

> Hard Exit<br />

> Yeah, I’ve heard that a few times myself from a few newb<br />

deckers trying to score an in to the biz. Bottom line is, you<br />

all don’t know for sure who the survivors were, do you?<br />

> Borderline<br />

> No.<br />

> KAM<br />

> Not really.<br />

> Bull<br />

> It’s hard to be sure.<br />

> Snopes<br />

> Nope.<br />

> The Smiling Bandit<br />

Second-generation cyberterminals began to<br />

gain popularity following the defeat of the Crash<br />

Virus. In 2032, the Corporate Court spearheaded<br />

a plan to rebuild the worldwide information network<br />

that was shattered by the Crash Virus. Using<br />

immersive virtual-reality technologies, this new<br />

network incorporated a three-dimensional graphic<br />

user interface, much like the old internet used<br />

a two-dimensional interface. The network was<br />

fully compatible with emerging cyberterminal<br />

technology, and it became known as the <strong>Matrix</strong>.<br />

<strong>Matrix</strong>-friendly, third-generation cyberterminals,<br />

fitting easily on desktops, became available to<br />

consumers in 2036. Just a few years later, Fuchi<br />

Incorporated hosted the Universal <strong>Matrix</strong> Specifications<br />

Conference, meeting for three months to<br />

determine a set of standards for <strong>Matrix</strong> programming.<br />

By 2050, cyberterminals were available as<br />

small as keyboards and were dubbed cyberdecks.<br />

The portability of these cyberterminals posed security<br />

issues for corporations. To the corporations,<br />


KILL CODE <strong>Matrix</strong> Systems, founded by former Echo Mirage alums<br />

Ken Roper and Michael Eld, created the first portable<br />

cyberdeck called the Portal. Sadly, all that research was<br />

lost just before both died in “accidents.” <strong>Matrix</strong> Systems<br />

was bought out by Richard Villiers at Fuchi, and the<br />

cyberdeck technology magically appeared again, released<br />

as the first Fuchi cyberdeck.<br />

> 0rkCE0<br />

The 2050s were a decade of ongoing change<br />

and discovery for the <strong>Matrix</strong> and those who accessed<br />

it. First, rumors of Ultraviolet hosts persisted.<br />

Hosts are virtual places on the <strong>Matrix</strong>, and Ultraviolet<br />

hosts were so lifelike that when someone experienced<br />

them in virtual reality, it was impossible<br />

to tell cyberspace from reality, causing many to go<br />

insane. However, the amount of processing power<br />

required to maintain these hosts was prohibitive for<br />

all but the most dedicated of corporations. The ability<br />

to turn off safety measures while on the <strong>Matrix</strong><br />

also became a problem in many ways. The <strong>Matrix</strong><br />

protocols dictated that certain bottlenecks be put<br />

in place to protect the metahuman mind from experiencing<br />

the 3D nature of the <strong>Matrix</strong> too vividly.<br />

Deckers found ways to turn these safety measures<br />

off, however, by using “hot simsense” and allowing<br />

them to move, think, and experience the <strong>Matrix</strong> on<br />

a much more intense level. In exchange for putting<br />

their mind in more peril through “hot sim,” they<br />

found their ability to combat IC and navigate the<br />

<strong>Matrix</strong> was enhanced as well.<br />

Even more nefarious activities continued to<br />

emerge as the <strong>Matrix</strong> developed. Halberstam’s<br />

babies for example. In 2052, Dr. Ronald Halberstam,<br />

previously of ESP, was found to be isolating<br />

the brains of children from their bodies and raising<br />

them completely in the virtual world of the <strong>Matrix</strong>.<br />

Also during the 2050s, the first true artificial<br />

intelligences (AI) were created. Or born. Depends<br />

on who you talk to. Anyway, AI exist without any<br />

physical bodies as self-aware and intelligent entities,<br />

dwelling only in the electronic worlds of corporate<br />

network hosts or the <strong>Matrix</strong> itself. Children<br />

called Otaku appeared, who could access the<br />

<strong>Matrix</strong> without a cyberdeck, using only datajacks<br />

linked to their brains.<br />

Soon, corporations began working on the next<br />

steps for the worldwide <strong>Matrix</strong>. More than a few<br />

tech-based corporations began making plans to<br />

implement a wireless <strong>Matrix</strong> that would be able to<br />

integrate the world’s devices without the need for<br />

physical connections. In time, the Corporate Court<br />

gathered <strong>Matrix</strong> security personnel from each<br />

AAA megacorp and founded the Grid Overwatch<br />

Division, typically referred to as GOD, tasked with<br />

executing law enforcement for this confederation<br />

of corporate fiefdoms.<br />

In 2058, the AAA corporation Renraku Computer<br />

Systems successfully captured an AI named<br />

Morgan. Renraku went on to slice up and utilize<br />

parts of her code to autonomously run their Seattle<br />

Arcology, which housed more than 90,000<br />

people. This new program gained its own form of<br />

autonomy and began calling itself Deus. In 2059,<br />

Deus took control of the Renraku Arcology and<br />

closed it off from the outside world. Eventually,<br />

Deus was defeated, and the Arcology shutdown<br />

was lifted. The legacy of Deus did not end there,<br />

however. In the early years of the 2060s, former<br />

servants of Deus formed a strange alliance with a<br />

doomsday cult known as Winternight. This partnership<br />

culminated in a worldwide attack on November<br />

2, 2064, aimed to destroy the world in its<br />

current form. While much of the physical damage<br />

was contained worldwide, the damage to the <strong>Matrix</strong>,<br />

called Crash 2.0, left the worldwide network<br />

in ruins. Early in 2065, the Second Universal <strong>Matrix</strong><br />

Conference introduced the wireless <strong>Matrix</strong>,<br />

which became the new standard.<br />

It was not long after this that the world was<br />

introduced to technomancers, or virtuakinetic<br />

metahumans, who could access the wireless<br />

<strong>Matrix</strong> with only their brains, not unlike the earlier<br />

Otaku, but without their wired connection. In<br />

some ways, they are like dual-natured creatures.<br />

Technomancers view the world in augmented reality<br />

by default, with <strong>Matrix</strong> data overlaying their<br />

vision similar to the way the Awakened perceive<br />

astrally.<br />

WHAT IS THE MATRIX?<br />

On January 1, 2075, the current version of the<br />

<strong>Matrix</strong> was revealed. Danielle de la Mar, notorious<br />

hacker adversary, proposed structures and<br />

Kyle Jones (Order #16164256)<br />

14 SO YOU WANT TO BE A HACKER >>


KILL CODE Poor Jolene sounds terrified. “Powerful Terasca,” “wise<br />

Terasca,” does this dragon have an inferiority complex or<br />

something?<br />

> Borderline<br />

> Well, we don’t really know much about Terasca, but they<br />

don’t seem to be a great dragon, only an adult. Jolene<br />

is most definitely afraid, given what happened to her<br />

predecessor. But trust me, she’s being extremely well<br />

taken care of for doing the work and peppering her words<br />

with draconic flattery.<br />

> Slamm-0!<br />

At its most basic, the <strong>Matrix</strong> is the network<br />

formed by every wired and wireless device on the<br />

planet. This network draws computing power from<br />

all of these devices and is thus capable of processing<br />

nearly unlimited amounts of data almost<br />

instantaneously. The connected nature of the <strong>Matrix</strong><br />

allows users to read messages, pay bills, and<br />

communicate over any distance. It monitors individuals’<br />

finances as well as the larger economy.<br />

It handles utilities, manages traffic on city streets,<br />

helps guns shoot more accurately, gives medkits<br />

access to medical records, and even detects wear<br />

and tear on clothing. It dominates nearly every<br />

facet of everyday life, no matter who you are.<br />

But this is only the surface. Just as magic can<br />

affect everyday life but is a different experience<br />

from entering the astral realm, entering the <strong>Matrix</strong><br />

itself through virtual reality is entirely different<br />

from using a <strong>Matrix</strong>-connected device. Entering<br />

the <strong>Matrix</strong> plunges you into a virtual universe, a<br />

shared consensual hallucination with every other<br />

entity inside. Everything is rendered in incredible<br />

detail powered by a century of digital graphics<br />

innovation. Most of the time, users can tell the<br />

difference between the <strong>Matrix</strong> world and the real<br />

one, but not always—such is the sophistication of<br />

the experience. It may be helpful to think of the<br />

<strong>Matrix</strong> as a great ocean planet. The <strong>Matrix</strong> proper<br />

is the water that defines the world. It touches everything<br />

and connects the world together. It is the<br />

medium through which we move from one place<br />

to another. Users can fly, walk, or even swim within<br />

it, travelling at nearly unlimited speed. While inside,<br />

all interactions will be with icons, 3D digital<br />

representations of the persons (personas), places<br />

(hosts), and things (files and devices) of the <strong>Matrix</strong>.<br />

Persons in the <strong>Matrix</strong> take a virtual form called<br />

a persona. It is a person’s digital representation,<br />

much in the same way that dual-natured creatures<br />

have a physical and astral forms. A user’s persona<br />

is tied inextricably to their brainwave patterns and<br />

global metadata, so they are virtually impossible<br />

to counterfeit, but more on that later. All around<br />

you are the personas of other <strong>Matrix</strong> users. These<br />

could be physical users of devices like legitimate<br />

users or illegitimate deckers, the living personas<br />

of technomancers, semi-autonomous servants<br />

called sprites or agents created by other users, or<br />

even AI. Due to the protocols which govern the<br />

<strong>Matrix</strong>, personas can be customized, but they can<br />

only appear as metahuman-sized objects, ranging<br />

in size between a dwarf and a troll.<br />

Floating alongside personas in the <strong>Matrix</strong> are<br />

devices. Any real-world devices connected to the<br />

<strong>Matrix</strong>, which in 2080 is nearly all of them, also<br />

appear as icons. Regardless of their actual physical<br />

size, devices in the <strong>Matrix</strong> almost always appear<br />

smaller than personas.<br />

Looming large over the vast ocean of the <strong>Matrix</strong><br />

are islands called hosts. In the <strong>Matrix</strong>, hosts<br />

hover far above everything else. Just like climbing<br />

out of the water onto land, climbing out of the true<br />

<strong>Matrix</strong> into a host is a transition. Inside hosts, physics<br />

are experienced however they are programed<br />

to behave. Most mimic real-world physics for the<br />

sake of ease of use, but this is not always the case.<br />

A host, sometimes inaccurately called a node<br />

due to old habits, is the “where” of the <strong>Matrix</strong>. <strong>Matrix</strong><br />

protocols are very specific as to the definition<br />

of what a host is, and yet there are <strong>Matrix</strong> places<br />

called “hosts” that do not quite conform to these<br />

<strong>Matrix</strong> protocols or definitions.<br />

> This new <strong>Matrix</strong> tried to completely replace devicebased<br />

hosts with virtual hosts, which have no physical<br />

counterpart. The exceptions are outdated hosts that<br />

existed prior to 2075 and rogue hosts; they still appear as<br />

hosts in the <strong>Matrix</strong>, despite the Grid Overwatch Division’s<br />

strict definitions.<br />

> Orbital DK<br />

> True. When the term was first coined, a host was the<br />

illusion of a 3D place within any network. Paranoid corps<br />


KILL CODE Bull<br />

Besides devices, there are other icons that can<br />

be interacted with on the <strong>Matrix</strong>, known as files.<br />

Files can be as simple as raw data like electronic<br />

mail or accounting details, but they may also be as<br />

sophisticated as programs that perform incredibly<br />

complex functions.<br />

The previously mentioned Grid Overwatch Division,<br />

or GOD, rules the <strong>Matrix</strong> ocean from far above<br />

it. GOD has physical servers located on a satellite<br />

orbiting the Earth, and in the <strong>Matrix</strong>, they are unseen,<br />

and keep watch far above even the hosts,<br />

only making their presence known when necessary<br />

to wield their power against a rule-breaker.<br />

Yes, great one—they are very much like dragons<br />

flying high over their domains.<br />

If GOD watches far above the <strong>Matrix</strong> sea, the<br />

Foundation is what exists below it. Most users do<br />

not know this Foundation exists, let alone know<br />

what it is. Access to the Foundation is no small<br />

feat. Pushing our ocean metaphor, the Foundation<br />

is the ground on which the ocean of the <strong>Matrix</strong><br />

lies and the stuff of which hosts are made. Hosts<br />

are connected to the Foundation via a “foundation”<br />

particular to that host. In this way, hosts are<br />

a bit like continents. Accessing a host’s foundation<br />

is perilous to say the least, even for members of<br />

GOD, who are given hazard pay even to perform<br />

the most routine maintenance there. This information<br />

is not common knowledge, however. Most<br />

corporations desire the populace to believe GOD<br />

is in complete control over the <strong>Matrix</strong> and is able<br />

to control it. This belief is dubious.<br />

> She’s right. What we’ve learned about the Foundation<br />

these last few years certainly dispels any notion that<br />

GOD controls it. They may have got the ball rolling, but<br />

it is definitely beyond their control. In fact, I don’t think<br />

anyone has control of it anymore. I’ve come to believe<br />

that even if all the devices in the world were shut down<br />

simultaneously, the <strong>Matrix</strong> would continue to exist.<br />

> /dev/grrl<br />

> Bulldrek. That doesn’t make any sense. Something<br />

can’t be one hundred percent virtual without a physical<br />

component. That isn’t how physics work. Go drunk, /dev/,<br />

you’re home.<br />

> Clockwork<br />

> I’ve come to believe the same, actually. It is a bit unsettling,<br />

but it appears the Foundation of the <strong>Matrix</strong> is far more<br />

than we thought it was. When the new <strong>Matrix</strong> first hit, no<br />

one knew about the Foundation. I believe GOD didn’t even<br />

really know about it. What I mean is, of course they knew<br />

how to use it to build hosts, but they didn’t know how it<br />

worked or how “foundational” to the new <strong>Matrix</strong> it really<br />

was. All they knew is that Danielle de la Mar and her team<br />

created something special, it worked, and it was very<br />

good at protecting corporate assets. They were willing to<br />

look past anything else. It wasn’t until their technicians<br />

started dying during routine jobs that they began to ask<br />

questions, and by the time they did, it was too late to do a<br />

damn thing about it.<br />

> Netcat<br />

> The truth is much darker and much more dangerous as<br />

well. Danielle de la Mar’s hatred of technomancers is<br />

well known. What isn’t public knowledge is that back<br />

in the early 2070s, de la Mar rubbed shoulders with<br />

anyone she could find who was doing experiments<br />

on us. When she was given the contract to oversee<br />

the creation of the new <strong>Matrix</strong>, she had her fingers in<br />

more than just the protocol pie. The corporations used<br />

double talk and technobabble to explain how the new<br />

<strong>Matrix</strong> was going to be hardware-free and completely<br />

virtual, but the physics just don’t work out. But de la<br />

Mar made it happen. She took what she learned from<br />

the experiments and used that to torture and forcibly<br />

network a gestalt of over one hundred technomancers,<br />

which she used as the “foundation” for her virtual<br />

<strong>Matrix</strong>. The building blocks she used to create hosts<br />

and data trails were the souls being sucked out of<br />

those hundred. When she presented a proof of concept<br />

to GOD and the rest of the Corporate Court, they were<br />

impressed and all pretended like they understood it,<br />

so as not to admit a virtual nobody like de la Mar was<br />

sharing knowledge that was beyond them.<br />

> Puck<br />

> Drek. Those are potentially damning charges. You’re<br />

saying that every time we use the <strong>Matrix</strong>, we are mindfragging<br />

a hundred technos somewhere? That doesn’t sit<br />

well with me.<br />

> Bull<br />

> I bet it sits just fine with Clockwork. That drek-hole is<br />

probably getting off now at the thought that using the<br />

<strong>Matrix</strong> hurts technomancers.<br />

> Slamm-0!<br />

> Wrong. The idea of the <strong>Matrix</strong> being built on actual<br />

technomancer mind patterns means I don’t want to be<br />

swimming in the <strong>Matrix</strong> if the whole thing is a demi-<br />

Kyle Jones (Order #16164256)<br />

16 SO YOU WANT TO BE A HACKER >>


KILL CODE Clockwork<br />

> Well, fortunately or unfortunately, you don’t have to<br />

worry about that. It’s been years since de la Mar intended<br />

to start unplugging the One Hundred to see if the new<br />

<strong>Matrix</strong> would work without them. Instead, she discovered<br />

that all the technomancers who acted as the foundation<br />

for her beloved <strong>Matrix</strong> were dead. You’re probably asking<br />

yourself how the <strong>Matrix</strong> is still functioning, then. Follow<br />

me. You know how Resonance and Dissonance wells have<br />

been popping up, seemingly at random, throughout the<br />

<strong>Matrix</strong> for years now?<br />

> Puck<br />

> Puck, you can’t be suggesting what I think you are.<br />

> Netcat<br />

> I can’t help but notice Jolene doesn’t mention Resonance,<br />

Dissonance, or Resonance realms to Terasca.<br />

> Bull<br />

> Probably because suggesting the idea that there are<br />

sources of information and power that dragons have no<br />

way to access is likely to get Ms. Price eaten.<br />

> Glitch<br />

> Back on topic: The source of the Resonance and<br />

Dissonance wells was the One Hundred. Their connection<br />

to the Resonance established a permanent link to the<br />

Resonance realms, permeating the Foundation. Once<br />

established, the link provided unlimited processing and<br />

storage power for the Foundation, and thus, the <strong>Matrix</strong>.<br />

In return, all data from the <strong>Matrix</strong> bled through into the<br />

Resonance realms. When the technos died, whether they<br />

had a hand in their own demise or not, the foundation<br />

persisted, and it is now a hybrid space between the sum<br />

of all metahuman digital data, the Resonance realms,<br />

and Dissonance realms as well. No one controls it,<br />

although GOD is still able to manipulate the top layers.<br />

> Puck<br />

> I’m gonna need some time to process all of that.<br />

> /dev/grrl<br />

> Likewise.<br />

> Netcat<br />

> Me too.<br />

> Bull<br />

> Me three.<br />

> Slamm-0!<br />

The <strong>Matrix</strong> depths can only be accessed<br />

through grids. Grids, to conclude our nautical<br />

metaphor, function a bit like patrons for long voyages.<br />

When sailors began exploring the Earth’s<br />

oceans in earnest, most did so with the patronage<br />

of wealthy nations. They bore the flags of<br />

their patron nations and were at the whims of<br />

their patron’s desires, but also were given access<br />

to supplies and finances they would be otherwise<br />

unable to obtain. Grids function much the same. In<br />

order to reach the <strong>Matrix</strong>, you must choose a grid<br />

through which to access it, much like cell phone<br />

carriers in the Fifth World. No grid, no <strong>Matrix</strong> access.<br />

There is a public grid, but using it means you<br />

have slow speeds, noise, and other built-in hurdles<br />

to overcome when trying to access information.<br />

Yes, the corporations planned it that way. Most<br />

major cities also have their own local grids, offering<br />

access only in that location, while the ten major<br />

megacorporations have their own, worldwide<br />

grids. Aside from the public grid, whichever grid<br />

is chosen, the difference in experience is largely<br />

cosmetic. Accessing the <strong>Matrix</strong> through the Ares<br />

grid will flood your vision with promotions of the<br />

newest Ares-produced items, while using the Seattle<br />

Grid would likely do the same with political<br />

advertisements or local restaurant ads. There is<br />

one large difference between the grids, however.<br />

Each grid is overseen by its own sub-division of<br />

GOD called a demiGOD. In our example above,<br />

being caught while breaking into a host on the<br />

Ares grid will bring Ares’ demiGOD division down<br />

on you, while New Orleans has its own demiGOD<br />

division whose jurisdiction only covers the city.<br />

A LOOK<br />

FROM THE INSIDE<br />

While the ocean world is a helpful metaphor for<br />

the structure of the <strong>Matrix</strong>, it is less helpful when<br />

describing the way the <strong>Matrix</strong> actually appears to<br />

those inside it. Glorious Terasca, it is my understanding<br />

that through your commlink and eyepiece,<br />

you have already experienced the <strong>Matrix</strong><br />

to some extent. While the visual overlays provided<br />

by your eyepiece give you some hint of<br />

what is possible through the <strong>Matrix</strong>, it is a limited<br />

experience, akin to astral perception versus<br />

actually entering astral space and exploring the<br />

metaplanes. While you were able to view the<br />

connected wireless devices all around you, see<br />

in-depth analysis of weather, local politics, and<br />


KILL CODE >


KILL CODE I wonder how a newly Awakened dragon heard that last<br />

bit. It can’t be easy to go to sleep an apex predator and<br />

wake up 5,000 years later as a side note.<br />

> Chainmaker<br />

> I don’t think anyone considers dragons to be side notes,<br />

especially ones who actually own the corporations Jolene<br />

here is talking about.<br />

> Cayman<br />

On the inside, hosts can appear however the<br />

owners desire, and internal physics are likewise<br />

set by the owners. Many times, physical locations<br />

like taverns and dance clubs appear in the <strong>Matrix</strong><br />

as exact replicas of their real-world counterparts.<br />

Other hosts, like those for online shopping, may<br />

appear as an endless vertical shopping mall where<br />

users are given shopping bags of endless capacity<br />

and are allowed to fly from storefront to storefront.<br />

Default VR settings filter out other visual stimuli<br />

as well, such as data trails, marks, and files, unless<br />

a user has a particular reason for wanting to<br />

see them. Data trails are visual representations<br />

of files, programs, and other data that move constantly<br />

through the <strong>Matrix</strong>. If filters did not turn<br />

these streams off, nothing else would be visible<br />

except for an all-encompassing data stream.<br />

Files in the <strong>Matrix</strong> are small and most often take<br />

a form that suggests their function. A collection of<br />

stories for example may appear as a book, while<br />

a song file may appear as a music note or music<br />

instrument.<br />

A mark is a <strong>Matrix</strong> Authentication Recognition<br />

Key. It is a sort of virtual brand that identifies<br />

legitimate users. When I was a child, my<br />

mother used to write the names of her children<br />

on the toys we were allowed to play with. If we<br />

were caught playing with a toy that did not have<br />

our name somewhere on it, we were punished.<br />

That is similar to how marks function. If a user<br />

does not have their unique marks on a device,<br />

they are denied access to the device. Users customize<br />

the look of their own marks, but they are<br />

invisible to other users by default. More crudely,<br />

it is similar to how certain animals mark territory<br />

with urine.<br />

THE ILLEGAL USE<br />

OF THE MATRIX<br />

While we are on the topic of marks …<br />

Oh. Yes, of course. Please ask whatever you’d<br />

like, great one.<br />

I’m sorry, I just want to make sure I hear you<br />

correctly; you want to know how to steal things on<br />

the <strong>Matrix</strong>?<br />

No, no, no, great one, that is not a problem at<br />

all. That is just not the first question I anticipated.<br />

Yes, of course it is because I am a lesser being.<br />

The answer is yes, you can steal things, and<br />

yes, the <strong>Matrix</strong> is where most people keep their<br />

wealth.<br />

Ah. I see. Well, as I mentioned, marks are necessary<br />

to perform any action on a device in the<br />

<strong>Matrix</strong>. In order to interact with a device, the user<br />

must have from one to three marks on the device.<br />

The exception to this rule is if a user is the device’s<br />

owner, which allows them to take any action with<br />

the device they desire. Once marks exist, users<br />

can interact with devices in all manner of ways,<br />

such as editing, copying, deleting, or sending files,<br />

controlling a device, or sending a message. Getting<br />

a mark on a device is usually something that<br />

is done by a device’s owner. Like my mother in the<br />

example above, the owner writes marks onto devices—one<br />

mark for a guest user, two for a user,<br />

three for an administrator.<br />

To now directly address your questions, attempting<br />

to write your own mark on a device<br />

without being invited to do so is considered<br />

an illegal and hostile action, and therefore garners<br />

the attention of GOD. This is where hackers<br />

come in. So-called deckers and lawless technomancers<br />

ply their trade by illegally marking devices<br />

through stealthy or brutish means, manipulating<br />

the device for their whims, and jacking<br />

out before the authorities are able to converge<br />

on them.<br />

Yes, there are groups of hackers, although the<br />

most successful either work alone or are part of<br />

larger organized crime syndicates.<br />


KILL CODE >


KILL CODE Anyone else thinking we should nickname this wyrm “the<br />

Crime Dragon?”<br />

> Slamm-0!<br />

> Yup.<br />

> Netcat<br />

> Oh yes.<br />

> Plan 9.<br />

> I’m agreeable to this.<br />

> Snopes<br />

Let me think a moment. Yes. There are a few<br />

more things worth mentioning before I begin research<br />

on those items. First, when accessing information<br />

or otherwise using the <strong>Matrix</strong> across different<br />

grids, <strong>Matrix</strong> protocols enforce automatic<br />

and arbitrary throttling of data speeds. This can<br />

be frustrating for hackers who wish to hop across<br />

grids regularly. Thankfully, there has been a recent<br />

development within the decker community that<br />

helps alleviate this. Exploits and backdoors of unknown<br />

origin have been slowly leaking into the<br />

hands of hackers.<br />

The most common backdoor discovered this<br />

way is the virtual collapse of cross-grid throttling.<br />

Only the poorest deckers operating on the public<br />

grid are slowed down anymore by cross-grid throttling.<br />

The public grid remains inefficient and full of<br />

noise by design, and none but the most desperate<br />

deckers use it. Other exploits include being able<br />

to access certain devices with fewer marks than<br />

normally required, or bypassing marks completely<br />

when attempting specific hacks. No one knows just<br />


KILL CODE Thanks for the temporary invite, Bull. In return for the<br />

info, I’ll drop some on you as well. You all know that<br />

near-legendary decker called Dodger, right? I know<br />

it is counterintuitive, but he worked closely with the<br />

Corporate Court to implement the new <strong>Matrix</strong> protocols.<br />

Lots of chummers called him a sellout. But whatever<br />

his reasons for working with the corps, he must have<br />

been keeping his roots in mind. Dodger seeded the new<br />

<strong>Matrix</strong> with numerous backdoors and exploitable security<br />

vulnerabilities, presumably to help him in whatever<br />

“quest” he was embarking on. Recently, some of those<br />

have been seeing widespread use. I don’t know if that was<br />

what Dodger had in mind, but either way, raise a glass<br />

sometime to that obnoxious elf.<br />

> Facet<br />

ICONS<br />

An icon is the virtual representation of a person, place,<br />

or thing in the <strong>Matrix</strong>. In broad strokes, personas are <strong>Matrix</strong><br />

people, hosts are <strong>Matrix</strong> places, and devices and files are<br />

<strong>Matrix</strong> things. PANs and marks also technically have icons,<br />

but only ever appear on other icons.<br />

PERSONAS<br />

A persona is the digital avatar of a <strong>Matrix</strong> user. When<br />

using a device, a persona merges with the device’s icon and<br />

presents only as the persona’s avatar. When a persona is<br />

created, the avatar is registered in the <strong>Matrix</strong>’s Foundation.<br />

It draws on vital statistics, biological records, and brainwave<br />

and usage patterns, and it is constantly updated with global<br />

metadata collected from every <strong>Matrix</strong> device worldwide.<br />

Without a dangerous dive into the <strong>Matrix</strong> Foundation, personas<br />

are impossible to counterfeit. A persona is logged in whenever<br />

the user is online with a device capable of running a persona.<br />

Global positioning data, incredibly advanced passkeys,<br />

biorhythm data, and past <strong>Matrix</strong> history all combine to virtually<br />

eliminate false logins.<br />

Technomancers do not need devices to engage the<br />

<strong>Matrix</strong>. They have icons called living personas that are also<br />

registered with the Foundation. Agents, sprites, and other<br />

autonomous and semi-autonomous icons, like AI, are also<br />

present as personas.<br />

> Dodger? He’s better than FastJack, right? That’s the rumor<br />

on the Seattle scene.<br />

> Borderline<br />

> Girl, there was a time you’d be booted from JackPoint<br />

for sayin’ that. But, no. Most of us don’t think so. Dodger<br />

spends too much of his time on other pursuits to be the<br />

best.<br />

> Bull<br />

Yes, great one. I will return shortly with the information<br />

you requested. It was my great honor to<br />

have been in your presence.<br />

MANUAL OF<br />

THE MATRIX<br />

It’s 2080. Hackers are more valuable than gold.<br />

Not that people in the Sixth World use gold as<br />

much as they used to, but you get the point. Everyone,<br />

everyone, is more effective with a good<br />

hacker watching their back, no matter who they<br />

are. Hackers bust through corp firewalls to get<br />

you the paydata. Hackers track down that fugitive<br />

Mr. Johnson is paying you to retrieve. Hackers<br />

eject the clips from the guns pointed at your face.<br />

Hackers make all the street lights turn green for<br />

the getaway car. Hackers are the team’s guardian<br />

angel of overwatch, spotting and defusing problems<br />

well before they can blow up in the team’s<br />

face, and stacking the deck in their favor instead.<br />

More importantly, they make their opposition<br />

miserable while doing so.<br />

But how does a hacker make that happen? Far<br />

more detail on hacking, such as how to create a<br />

hacker character, purchasing gear, and expanded<br />

explanations of rules and terms can be found in<br />

the <strong>Matrix</strong> section of the SR5 core rulebook (p.<br />

214). But to get into the action as quick as possible,<br />

read on. This section has a large number of<br />

sidebars to make it easy to find information on a<br />

particular topic.<br />

MATRIX MAGIC<br />

The <strong>Matrix</strong>, by way of oversimplification, is an<br />

infinite virtual world created by the networking<br />

of every connected device on the planet, which<br />

somehow is more than the sum of its parts. Icons<br />

of every person, place, or thing on the <strong>Matrix</strong><br />

Kyle Jones (Order #16164256)<br />

22 SO YOU WANT TO BE A HACKER >>


KILL CODE


KILL CODE >


OWNERSHIP<br />

Every device, persona, host, and file is owned by someone.<br />

With ownership comes privileges. A <strong>Matrix</strong> object can only have<br />

one owner, but there is no limit to the number of <strong>Matrix</strong> objects you<br />

can own. The owner can always spot its property in the <strong>Matrix</strong>.<br />

Owning an icon is basically like having four marks on it.<br />

Ownership of a <strong>Matrix</strong> device is registered with both the device<br />

and the <strong>Matrix</strong> grids, so changing ownership is a bit complicated.<br />

The owner of an icon can legally transfer ownership to another<br />

person in less than a minute. You can illegally change a device’s<br />

owner with a Hardware toolkit and a Hardware + Logic [Mental] (24,<br />

1 hour) Extended Test. Performing this test requires access to the<br />

<strong>Matrix</strong>; a glitch results in the authorities being notified.<br />

Ownership of an offline host is registered with the host itself and<br />

>> KILL CODE


KILL CODE >


KILL CODE


KILL CODE >


KILL CODE


KILL CODE >


KILL CODE


KILL CODE >


KILL CODE


KILL CODE >


KILL CODE


KILL CODE >


KILL CODE


KILL CODE >


KILL CODE


KILL CODE >


KILL CODE


KILL CODE >


KILL CODE


KILL CODE >


KILL CODE


KILL CODE >


KILL CODE


KILL CODE<br />

DIPS<br />

& CHIPS<br />

BROUGHT TO YOU BY: ESTABAN<br />

Greetings JackPoint! I am Estaban, brother of Armand.<br />

I operate Estaban’s Electronics Extravaganza<br />

and welcome the opportunity to offer insight into<br />

goods and services for such an esteemed clientele.<br />

Introductions done—now let’s talk tech toys,<br />

and not just those high-end cyberdecks and dinky<br />

dongles people add on to get a little more function<br />

out of their fancy form. I’m talking sweet toys<br />

that can make a razorgirl grin ear to ear or get that<br />

sly smirk out of your favorite face. Several pieces<br />

here are R&D bits, but corps are tossing them at<br />

the streets like candy on the parade route, while<br />

others are new entries or my favorite model of a<br />

toy everyone makes. Check the chatter box for<br />

other folks’ views and see the little intro script for<br />

my thoughts. Hit me with a PM for any orders;<br />

I can fill them in most major runner sprawls in<br />

a day or two, smaller spots usually take a week<br />

or so, and anywhere else looks like a week minimum,<br />

possibly up to a month. If I can’t get ya<br />

gear in a lunar cycle, we’ll just call it a no-go until<br />

you can crawl back toward civilization for half a<br />

tic for pickup.<br />

Shop and enjoy!<br />

AMMO<br />

We’ll start with my bestsellers, because just about<br />

anyone can use a lead-slinger. Most of the rounds<br />

listed have limits based on the slug size. Some<br />

just can’t be miniaturized enough to be effective<br />

in that little purple Tiffani you pack; others just aren’t<br />

as effective when designed smaller. I’ll make<br />

sure to keep that distinction clear below.<br />

ZAPPER ROUNDS<br />

Not to be confused with good ol’ Stick-n-Shock,<br />

these rounds actually cause damage to electronic<br />

systems, rather than the electronics themselves.<br />

Using a mix of wireless data burst broadcasting<br />

tech and dense IC coding, the round attacks the<br />

object in the “<strong>Matrix</strong>.” Why the quotes? Glad you<br />

asked, because early models were useless once<br />

you shut the wireless off on your device. But<br />

that’s not the case after the redesign. Now, as<br />

long as your device is active and capable of accessing<br />

the <strong>Matrix</strong>, even if the receiver is currently<br />

shut down, the contact protocols in the rounds<br />

do the job as long as you’re a good shot.<br />

Here’s what I mean. Use these on someone actively<br />

connected, hidden or not, and you can pretty<br />

much hit anywhere on their person and something<br />

is gonna get popped. The coding latches<br />

onto the first device it can break through and then<br />

folds and repeats inside, using its limited power to<br />

pull off its effect. Mass effect versions that scramble<br />

and frag up everything are in the works, but for<br />

now you’ll only find that bit of gear terrorism over<br />

in the grenades department.<br />

Now, if you’re a solid shot, you can bullseye<br />

something specific and you can pretty much guarantee<br />

the code’s concentrated enough to drill into<br />

that single piece. More than one decker has been<br />

unprepared for one of these hitting their deck.<br />

Most decks have better protection than your average<br />

armored jacket and they might be able to take<br />

the hit, but get tagged while you were planning to<br />

sleaze in rather than take on IC and you just might<br />

be taking pointers from the street sam about how<br />

to stay useful in the fight. Of course, he might be<br />

slowed down to your speed, because his wires got<br />

tagged too.<br />

> These are being looked at heavily by several law<br />

enforcement security corps as tech suppressors in hostile<br />

situations. Send in one member of the team with a light<br />

machine gun or something equally ammo abundant,<br />

and just lay down fire. Enough rounds hitting, even just<br />

sprayed in general, cuts comms, disarms weapons, kills<br />

cyber, and frags their tech hard. Doesn’t even matter<br />

if you have civvies around because the rounds are one<br />

Kyle Jones (Order #16164256)<br />

48 DIPS & CHIPS >>


hundred percent non-lethal. Barely even enough damage<br />

to blind an eye on a direct hit.<br />

> Stone<br />

> Not one hundred percent. Headware and medical cyber,<br />

like artificial hearts, that get bricked can cause brain<br />

damage and death.<br />

> Butch<br />

> I’ll accept your point there, but all that ’ware came with<br />

a signed waiver relieving any and all parties of death<br />

responsibilities in the case of equipment failure or error.<br />

> Stone<br />

> What?!<br />

> /dev/grrl<br />

> Drek! He’s not making that up. It’s buried in the legal<br />

jargon. No one is legally responsible if a device installed<br />

within the cranial cavity causes brain damage or death. It’s<br />

in every corp’s fine lines for that kind of ware.<br />

> /dev/grrl<br />

> First off, stop hanging around Bull. Secondly, I thought<br />

we’d jaded you a bit more than that, /dev/. They control<br />

everything. They won’t be financially responsible for<br />

anything they don’t want to be.<br />

> Glasswalker<br />

LOOPER ROUNDS<br />

ZAPPER ROUND RULES<br />

Rather than doing normal damage, these bullets do <strong>Matrix</strong><br />

Damage. The standard ranged attack roll is made with damage<br />

increased by net hits and applied to a single device possessed,<br />

worn, carried, or implanted in the targeted individual. The<br />

device receiving the damage is selected at random by the<br />

gamemaster, or by the attacking player if they succeed in a<br />

Called Shot. Devices can only be targeted by a Called Shot if<br />

they are visible to the attacker. Damage Resistance roll is made<br />

using the Device Rating + Firewall, along with any other damage<br />

resistance programs.<br />

Burst Fire and Full Auto have an alternate option. Instead of<br />

hindering the target’s Defense Test, the attack strikes multiple<br />

devices, or one device more than once. Burst Fire hits twice,<br />

Long Burst hits three times, and Full Auto hits four times.<br />

Avail: 12R, Cost (per 10): 140¥<br />

These rounds were developed on the streets of<br />

Chicago back in ’76, during a stint of time that<br />

the place had shoddy wireless. The corps were<br />

using a lot of the old wired infrastructure on their<br />

security and deckers just didn’t have enough data<br />

taps to clip onto every exposed wire in sight. The<br />

coding came from a local hacker known as 3D,<br />

while the round modification came from his pal<br />

Byom. Credit given, now quit your slitching. They<br />

modified a set of Stick-n-Shock rounds to hit recording<br />

devices, audio, video, trideo, didn’t matter,<br />

run a rapid burst of Edit coding on a customized<br />

RFID in through a feed similar to touchlink to<br />

create a footage loop, and then use the capacitor<br />

power to keep up the mini-hack for as long as it<br />

could. The things were aces on the streets with<br />

those teams that still valued anonymity. Needless<br />

to say, the number of those in Chicago is limited,<br />

but MCT got their hands on the tech and wanted<br />

it for their own company men. Once in the hands<br />

of MCT, every other corp wanted it, and now the<br />

rounds are produced by several arms manufacturers<br />

and no longer look like a wad of snot on<br />

impact (no offense, Byom).<br />

These wonderful tools have two drawbacks<br />

that no R&D department has managed to correct:<br />

velocity and accuracy. The combination of electronics<br />

loaded in the slug make it poorly balanced,<br />

and their delicate nature makes hitting things at<br />

high velocity a tragic endeavor. The solution is a<br />

secondary boon for teams that like to stay qui-<br />


KILL CODE The rounds will loop eyeware if you tag a target in the<br />

face. It’s not easy because they don’t fly very straight, so a<br />

moving target is almost certainly not going to be hit, but it<br />

works. Bonus effect: A reboot doesn’t help as long as the<br />

round is still present and active, so whoever you hit has to<br />

peel off the slug first in order to reboot.<br />

> 2XL<br />

> Side of the head works too. Eyeware is weird because we<br />

focus on sight so much. Earware often just makes us feel<br />

deaf. Though if you can time a loud noise with the loop,<br />

you can drop a troll.<br />

> Stone<br />

> If you can hit them in the head with round, why not just<br />

d-rez their brain?<br />

> 3L1T3<br />

> Because killing in the real world ain’t like de-rezzing in the<br />

<strong>Matrix</strong>. It’s real, bloody, and real bloody.<br />

> Stone<br />

> I’ve killed plenty. Brain-fry is just as dead as scrambled<br />

software.<br />

> 3L1T3<br />

> 3L1T3, what’d they look like? Just tell me one.<br />

> Stone<br />

> I took down the infamous Cube of Death, Charles<br />

Cunningham Conrad. Old-school black IC cube persona<br />

with razor teeth and a sawxblade launcher.<br />

> 3L1T3<br />

> Perfect kid, thanks. I sent you a pic in a PM, that’s<br />

Charlie. He was fourteen and angry at his parents for<br />

giving him a cyberdeck instead of fixing his spine.<br />

None of his attacks ever seriously injured anyone,<br />

and while he did an impressive eight-figure total of<br />

damage with his hacking skills, he still worried about<br />

people’s lives.<br />

> Stone<br />

> So?<br />

> 3L1T3<br />

> PM me in a week. Let’s stop hogging bandwidth here.<br />

> Stone<br />

> Damn! Late to the game. What happened?<br />

> Hexatite<br />

> PM Stone and find out. Locking out the thread.<br />

> Glitch<br />

FUZZY ROUNDS<br />

Sick of getting hacked while you only have a<br />

vague idea of where the hacker is? Or maybe you<br />

know exactly where she is and you really want to<br />

mess with her day? Keep a clip of fuzzy rounds<br />

around.<br />

50 DIPS & CHIPS >><br />

Kyle Jones (Order #16164256)


KILL CODE These are also great for shutting down a guard’s comms<br />

for the second or two it takes to cover the distance to<br />

bring them down quietly, or if you’re concerned that you<br />

won’t be able to bring them down before they can squawk<br />

for help.<br />

> 2XL<br />

> It’s rare, but occasionally the emitters in the rounds cancel<br />

each other out. The frequencies negate each other, and<br />

they have zero effect when fired together.<br />

> Beaker<br />

E0-E0 ROUNDS<br />

Before you ask, no, E0-E0 is not short for anything—<br />

it’s a play on the use of 3s as Es in hacker speak.<br />

In some strangely humorous (to someone, somewhere<br />

I guess) way, it’s a reference to the famous<br />

30-30 hunting gauge of big-game rifles because<br />

these rounds are designed to hunt technocritters<br />

and, in a way I can’t explain well, electrosapients.<br />

The technocritter side, I get. The rounds emit a<br />

burst of biofeedback similar to <strong>Matrix</strong> Attack protocols<br />

that hit the electronic persona of the technocritter.<br />

KO the electro side, KO the critter with<br />

practically no physically damaging attack. Popular<br />

in hunting for researchers who have some level of<br />

morals, because hitting a non-Emerged critter with<br />

these things does nothing.<br />

As for AIs and the various metasapiant critters<br />

that have been popping up more and more often<br />

lately, how it works is more technically complex,<br />

but I got a basic primer to help me understand it,<br />

so I can sell it. Each round has a special RFID chip<br />

with a focused set of programs. One program detects<br />

the presence of AI or technosapient coding,<br />

FUZZY ROUND RULES<br />

Fuzzy rounds use Light Pistol ranges and create a narrow<br />

area of Noise. The modifier is +1 Noise per round, cumulative,<br />

and it lasts for 2 Combat Turns.<br />

The Area is determined by the type of round and the attack<br />

roll. When attacking a location, the Area of Effect is a radius of<br />

1m/net hit with the maximum AoE based on ammo type. When<br />

attacking a target that can avoid the attack, the Area of Effect<br />

is the same, but that pocket of Noise moves with them for the<br />

duration with a successful hit.<br />

Suppressive fire can cover a targeted area (a line of the<br />

firer’s choosing). The attack roll and line length determines<br />

the Noise modifier, spreading the +20 evenly over the affected<br />

zone. Targets within the line that get hit are affected as above<br />

and decrease the overall number of rounds for the affected<br />

zone, decreasing the +20 by 1 per target hit.<br />

As mentioned in the flavor text, glitches can cancel some<br />

effectiveness or even crack rounds in the gun and affect the<br />

shooter as powdered bullets spray into the air around them.<br />

TYPE<br />

Light Pistol, Machine<br />

Pistol, Assault Rifle<br />

MAX AOE<br />

COST (10<br />

ROUNDS)<br />

2m 30<br />

Heavy Pistol, SMG, Shotgun 5m 50<br />

Avail 10R and 12R, respectively.<br />

the second attacks it. A third portion of the programming<br />

releases a solvent into the round if the<br />

attack protocol is tripped, turning the round to a<br />

fine spray that quickly dries into a thin dust. I was<br />

told the round loses some effectiveness when<br />

operating across grids and can’t affect electrosapients<br />

on hosts because the programming protocols<br />

require some level of local device ID capture<br />

to hit the various microprocesses that are running<br />

on each local device for the overall <strong>Matrix</strong>. Hitting<br />

something that is currently loaded onto or inhabiting<br />

a device has the opposite effect of attacking<br />

across grids, making it more effective.<br />

Even though the rounds are named for a famous<br />

hunting rifle, they are mainly made for pistols and<br />

submachine guns due to the load size and the limited<br />

effective range. I discussed this with a manufacturer<br />

and pointed out the difficulty of hunting a<br />

technocritter at such a close range. He mentioned<br />

a rifle caliber in the works, but prototypes had thus<br />

far not overcome the physical damage caused by a<br />

round of sufficient mass for that range of effective<br />

and accurate flight.<br />


KILL CODE Fragging ignorant fragheads. “No physically damaging<br />

attack”?! Just an electronic assault in their brain!<br />

> Netcat<br />

> As you can tell by her anger … yes, they work against<br />

technomancers!<br />

> Clockwork<br />

E0-E0 ROUND RULES<br />

E0-E0 rounds use Light Pistol ranges and cause <strong>Matrix</strong><br />

Damage to technosapients (including AIs), technocritters, and<br />

technomancers. A standard Ranged Attack roll is resisted with<br />

a <strong>Matrix</strong> (Intuition + Firewall) or Physical (Reaction + Intuition)<br />

Defense roll. If the attack hits, roll <strong>Matrix</strong> Damage Resistance<br />

(Device Rating + Firewall) as normal, with a +2 modifier for each<br />

level of grid difference (public/local/megacorporate) between<br />

the attacker and target. The attacker has to choose what grid<br />

the rounds operate on at the time of purchase. If the AI or<br />

e-critter is inhabiting a device, they suffer a –2 modifier to their<br />

Damage Resistance.<br />

TYPE DAM MOD AP MOD AVAIL<br />

COST (10<br />

ROUNDS)<br />

E0-E0 — — 5R 50¥*<br />

E0-E0 Rifle –4 –4 5R 100¥*<br />

*The base price is for rounds for the public grid. Rounds<br />

for local grids are 60. Rounds for megacorporate grids are 100.<br />

ARROWLINK RULES<br />

The ArrowLink allows the user to ignore all Noise<br />

modifiers across a distance between the user and the<br />

hit target, making it able to bypass jammers, local spam,<br />

environmental modifiers, distance, etc.<br />

Hitting and sticking the arrow requires 2 net hits on<br />

the Attack Test and does no damage. Removing the arrow<br />

requires an Extended Strength (4 + net hits, 1 Complex Action)<br />

Test. Severing the cord cuts the connection and requires a<br />

Strength (2) Test or 1 box of Physical Damage, leaving the<br />

arrow in place.<br />

Firing even a single meter beyond the cord length causes<br />

the cord to snap.<br />

TYPE AVAIL COST<br />

50m 6R 25¥<br />

100m 8R 75¥<br />

200m 10R 200¥<br />

500m 12R 400¥<br />

ARROWLINK<br />

This one was a little weird, and I include it here<br />

because it is technically ammo, but really just intended<br />

as an accessory, though I imagine some<br />

creative hoophats could come up with an offensive<br />

use. To the point!<br />

The ArrowLink looks like a standard arrow shaft<br />

with a short cord attached to a hook, dataplug<br />

on the end, and a broadhead arrowhead made of<br />

black rubber. The plug goes into any universal port<br />

on a <strong>Matrix</strong> device. The shaft of the arrow is filled<br />

with a microfine datacord that comes out during<br />

flight and just behind the head is a broadcast<br />

nodule. The cord creates a one hundred percent<br />

noise-free connection between the arrow and the<br />

connected device.<br />

The various models include different lengths of<br />

cord, the most expensive part of the arrow. Once<br />

used they can’t be reused because of the special loading<br />

method of the cord to prevent breakage in flight.<br />

The head is made of an ultra-adhesive material capable<br />

of sticking to all but the most slippery surfaces.<br />

The goal of the ArrowLink is to make a perfect<br />

connection between a commlink or cyberdeck,<br />

usually the latter, and a point outside of an area of<br />

intense <strong>Matrix</strong> interference.<br />

> These are also great for tagging a living target and giving<br />

you a quick window of clean signal to scrag as much<br />

of their wireless gear as possible. Even if they yank the<br />

arrow and drop it, it’s usually close enough to them to<br />

keep a clean signal.<br />

> Hexatite<br />

> It doesn’t even have to hit a person. Hit the nearby<br />

building and no one even realizes they are point blank for<br />

a clean cyberattack until it’s way too late.<br />

> Glitch<br />

GRENADES<br />

Sometimes the oddest friendships can create<br />

some of the most interesting results. Much like the<br />

looper rounds discussed above, several of these<br />

grenades came from the drunken late-night conversations<br />

between Byom and 3D around a trashcan<br />

fire in Hoodville in the Chicago CZ. It’s what<br />

happens when a tech expert and a demolitions<br />

expert get together and start brainstorming. Other<br />

entries here are inbound from Evo’s labs (guess<br />

who designed those) and leave a bad taste in my<br />

mouth, but I can’t lie—they’re effective.<br />

Kyle Jones (Order #16164256)<br />

52 DIPS & CHIPS >>


KILL CODE So basically they made high-intensity spam-jammers,<br />

with visual coding, that are disposable.<br />

> Bull<br />

> But the rabbits are so funny! I did a little program tweaking<br />

and mine all have little Slamm-0! style bats for ears.<br />

> Slamm-0!<br />

> I made cat ones. Duh.<br />

> Netcat<br />

FUZZY GRENADE RULES<br />

Fuzzy grenades come in varying Power levels. The Power<br />

is the base Noise modifier for the grenade. This Power goes<br />

down by 1 for every 2 meters from the point of origin. The<br />

maximum Power currently available is 20. The Noise lasts for<br />

2 Combat Turns.<br />

GRENADE AVAIL COST<br />

Fuzzy 10R 20¥ x Power<br />


KILL CODE Technos hate these even more. The momentary separation<br />

from the <strong>Matrix</strong> can be debilitating.<br />

> Clockwork<br />

COS GRENADE RULES<br />

The grenade interrupts all <strong>Matrix</strong> access (and with it,<br />

all wireless bonuses) for all devices within the affected<br />

area. Anyone using a commlink, cyberdeck, or RCC in full<br />

VR mode immediately suffers dumpshock (see p. 229, SR5).<br />

Drones separated from their RCC continue to follow their last<br />

commands until they reconnect.<br />

A device that loses its <strong>Matrix</strong> connection alerts its user<br />

that it will shut down and reboot automatically at the end of<br />

the present Combat Turn. The user may prevent it from doing<br />

so with a Simple Action (or a Free Action via DNI). Multiple<br />

devices require separate actions unless they are slaved to<br />

the same master device. Devices that reboot come back<br />

online at the end of the following Combat Turn.<br />

Technomancers in range must resist 10S damage and are<br />

temporarily severed from the <strong>Matrix</strong>.<br />

GRENADE AVAIL COST<br />

CoS 10R 500¥<br />

DOUSER<br />

I am an advocate for the advancement of beneficial<br />

(especially to my credstick) technology.<br />

That said, I will openly admit that I take issue with<br />

some of the drek coming out of Evo, because I<br />

know full well how they got it. On the backs of<br />

Monad slaves that somehow bought into Evo’s<br />

“meta-friendly” image and decided it was better<br />

to work for them than to escape the shackles of<br />

this world and shoot off into the stars.<br />

Okay, maybe I’m a little jealous, but Evo has<br />

been working their big brains and using them to<br />

develop tech that is leaps and bounds ahead of<br />

competitors (until they get stolen) for nothing<br />

more than a prison within their own corp.<br />

Sorry for the sidetrack. Douser is all sorts of<br />

scary. The basic adverts for the grenade seem<br />

pretty mundane. Toss it out and let it wear down<br />

the protective code of all local hardware. Slightly<br />

more technical, it does a focused attack on the<br />

Firewall of every device in the area of effect. How<br />

it does this is the truly scary part. Monads aren’t<br />

afraid of nanites (unless it’s the frag-all crazy ones<br />

that zipped up Boston), so they have no problem<br />

designing a few new bits of tech that utilize some<br />

of their own groupthink-designed nanotech. That’s<br />

the Douser design.<br />

When the grenade explodes, it releases a vapor<br />

cloud over a narrow area. This vapor cloud isn’t<br />

just heated water vapor; it also contains a massive<br />

volume of nanites. The nanites merge processing<br />

power and programming for a single purpose. No,<br />

not overwriting your brain—stop living in the past.<br />

In the case of Douser, the nanites ravage the Firewall.<br />

Get it? FIREwall. Douser. So funny. The nanite<br />

programming can shred the defense systems of<br />

low-end electronics in a blink, leaving them vulnerable<br />

to attack, and it softens even the highest-end<br />

systems.<br />

Best thing is, they don’t discriminate, and they<br />

hit every bit of tech in range. Only thing that can<br />

keep you safe, is a full shutdown. Even killing the<br />

wireless doesn’t stop them from landing on you<br />

and close enough to access via a touchlink style<br />

system.<br />

> Not to go off-topic, but I know Mr. Johnsons in at least<br />

twelve different cities who are running Evo contracts at<br />

an alarming rate. The money is there if you’re up for the<br />

variety of new challenges you may face.<br />

> Fianchetto<br />

Kyle Jones (Order #16164256)<br />

54 DIPS & CHIPS >>


KILL CODE Biggest issue I’ve come across with current ops on Evo:<br />

overlap. Teams running into other teams going after R&D<br />

in the same facility.<br />

> Mika<br />

> Hackers running Wrapper programs to look like locals are<br />

getting into scuffles with fellow runners and bringing IC<br />

down on everyone’s head. It’s ugly out there, kiddos.<br />

> Bull<br />

DUMDUM<br />

While attacking the Firewall of a system was a<br />

great first step and seemed logical, the techs at<br />

Evo then went a step further. Why not ignore<br />

the protection protocols completely and instead<br />

flood the processing system with pointless functions<br />

to the point of overload and shut down devices<br />

that way?<br />

DumDum goes after the Data Processing system<br />

instead of the Firewall software. Instead of<br />

leaving a device defenseless or forcing it to shut<br />

down, the cloud of DumDum nanites gobs up the<br />

system with junk processes and prevents the system<br />

from performing normal operations. There<br />

is no shutdown warning with DumDum, just a<br />

sudden inability to complete any kind of task. A<br />

successful barrage will make even voice or text<br />

transmission impossible, and the only report you<br />

get is the “thinking” icon of your particular device.<br />

Transys devices are particularly humorous, as the<br />

little fighting knight slows down and moves in a<br />

herky-jerky slow motion. A full shutdown/reboot<br />

gets the system clean, but it has to be a hard shutdown<br />

and restart (a.k.a. holding down the power<br />

button), because the reboot process is slowed by<br />

the attack as well. Devious little system they developed<br />

here. No real warning until you need to<br />

do something.<br />

> I can’t decide whether the use of weaponized nanites<br />

so soon after the events of Albuquerque and Boston is<br />

a sign that we have way too short a memory, that we’re<br />

extremely resilient when it comes to tech, or that we’re<br />

just that fragging stupid.<br />

> Bull<br />

> The last option. Definitely!<br />

> Slamm-0!<br />

> Widespread understanding of the truth of CFD just isn’t<br />

there. Every corp puts enough spin to make its citizens<br />

feels safe, and most of the major nations of the world get<br />

DOUSER RULES<br />

The nanites burst out over a five-meter-radius sphere.<br />

The nanites make a single Rating x 2 [Rating] (Firewall) Test.<br />

Hits over the threshold decrease the Firewall rating of all<br />

devices in the area at a rate of –1 per net hit. Cyberware is<br />

also targeted by the attack.<br />

When a device’s Firewall is reduced to zero, it alerts its<br />

user that its protection software has been compromised, and<br />

that it will shut down and reboot automatically at the end of<br />

the present Combat Turn. The user may prevent a device from<br />

shutting down with a Simple Action (or a Free Action via DNI).<br />

Multiple devices require separate actions unless they are all<br />

slaved to the same master device.<br />

Firewalls remain at their lowered state until rebooted.<br />

Devices that shut down and reboot come back online at the<br />

end of the following Combat Turn with their Firewalls fully<br />

restored.<br />

Gamemaster note: This attack could take a lot of recordkeeping<br />

time. To simplify the process, have the character<br />

take note of the final hits total and only worry about it if they<br />

try to use a piece of gear or the piece of gear gets digitally<br />

attacked. The number of hits divided by two can act as a<br />

simple distraction modifier for the Combat Turn as their AR is<br />

flooded with warnings.<br />

The maximum rating of the Douser grenade is 10.<br />

their news from corp feeds.<br />

> Snopes<br />

> Blaming nanites for CFD is like blaming a gun for shooting<br />

someone. They were a tool to complete a task. I won’t<br />

say it could never happen again, but I am saying that<br />

the number of jobs getting offered by AIs to go free their<br />

fellows from some dark and well-guarded places is high.<br />

> Ma’fan<br />

ACCESSORIES AND TOYS<br />

This is kind of my catch-all category for things<br />

that don’t fit elsewhere. It’s a bit of a hodgepodge,<br />

but it’s good stuff.<br />

FACELESS<br />

GRENADE AVAIL COST<br />

Douser (Rating x 2)F Rating x 50¥<br />

This could have gone in the Cutting Aces file, as it’s<br />

perfect for those who prefer not to be identified.<br />


KILL CODE Every runner in the world needs to use these things.<br />

They’re killer high-end tech, with the price tag to match,<br />

but these babies are bringing the shadow back to<br />

shadowrunning.<br />

> Mika<br />

> I know a fellow who is quite protective of his anonymity<br />

and used both a nanopaste mask and the Faceless lapel<br />

pin in the form of a rose to make sure no one can be sure<br />

it’s him passing through security.<br />

> Thorn<br />

> A rose, eh? Don’t know who that could be. Is it an Irish<br />

rose perhaps?<br />

> Slamm-0!<br />

> It’s advice without pretension, Slammy. You should try it<br />

sometime.<br />

> Thorn<br />

> Seriously, talking about someone else when we all know<br />

it’s you is pretty much the definition of pretentious.<br />

> Slamm-0!<br />

> Don’t sell the authorities short on getting to those devices<br />

that actually snag your face. That hardwired convenience<br />

store cam may have gotten you, but the cash they slipped<br />

the owner, or the beating they gave him, just make the<br />

intel less useful in a court of law.<br />

> Black Knight<br />

> Like most of us will ever see a court of law.<br />

> Balladeer<br />

BOOSTER CLOUD<br />

Another creation using nanites coming out of<br />

Evo’s labs, but also being produced by Saeder-Krupp<br />

and Renraku. Which means we know<br />

who contracted some jobs against Evo. Anyway,<br />

the booster cloud is a nanite-filled aerosol can<br />

about the size of a can of pepperpunch. When<br />

dispensed, the nanites are preprogrammed to<br />

enhance a specific <strong>Matrix</strong> function. The cans<br />

were originally meant as an in-the-field booster<br />

for corporate deckers but have slipped onto the<br />

streets, like most super-handy tools.<br />

Data spike cans are some of the most com-<br />

Kyle Jones (Order #16164256)<br />

56 DIPS & CHIPS >>


KILL CODE These things are great for pre-planned gigs or a little<br />

boost on the fly. Toughest trick is getting them past<br />

security, but I know a secondary-market guy who<br />

does custom casings. Spray paint, inhalers, perfume<br />

bottles—If it comes with a spray nozzle, he can probably<br />

fit a booster into it.<br />

> Slamm-0!<br />

MULTIPROGRAM<br />

OPERATING SYSTEM<br />

If it works in a piece of cyber, someone usually<br />

figures out how to make it work outside said<br />

piece of cyber. Much like the internal system of<br />

the datajack plus (see below), the multiprogram<br />

operating system (MOS) allows for the addition<br />

and operation of a plethora of additional programs.<br />

Without the additional computing power<br />

that the d-plus pulls from the brain, the MOS requires<br />

an extensive series of processors, pushing<br />

its cost up and even beyond the d-plus, but hey, it<br />

doesn’t require a hole in your skull. (I know, not a<br />

concern, but I’ve already caught tons of flack for<br />

the cost!) The system comes with a datacord and<br />

insulated storage case as it’s too large to mount<br />

BOOSTER CLOUD RULES<br />

A Simple Action disperses a half can, a Complex Action<br />

disperses the whole can. Half the can offers a +1 dice pool<br />

modifier, +1 to the applicable limit; the whole can offers a<br />

+2 dice pool modifier, +1 to the applicable limit. The quantity<br />

released determines the bonus to a single type of <strong>Matrix</strong><br />

Action, for up to 3 Combat Turns depending on the local air<br />

movement (winds, spells, ventilation systems, etc.).<br />

TYPE AVAIL COST<br />

Brute Force 6R 250¥<br />

Control Device 6R 200¥<br />

Crack File 6R 150¥<br />

Crash Program 6R 150¥<br />

Data Spike 8R 300¥<br />

Edit File — 150¥<br />

Erase Mark 6R 150¥<br />

Hack on the Fly 6R 250¥<br />

Hide 6R 150¥<br />

Jam Signals 6R 150¥<br />

<strong>Matrix</strong> Perception — 100¥<br />

Reboot Device 6R 250¥<br />

Snoop 6R 200¥<br />

Spoof Command 6R 250¥<br />

Trace Icon 8R 200¥<br />

Custom Case 6 200¥<br />


KILL CODE Don’t let this thing get near you deck when it’s operating.<br />

The processors can barely cool themselves, and the box<br />

gets hot enough to burn flesh. Use the datacord and<br />

insulated box.<br />

> Pistons<br />

> I don’t recommend it, but I’ve used the box as a painful<br />

distraction before by running it while someone was trying<br />

to procure it from me during a field test.<br />

> Slamm-0!<br />

> You field-tested these? How hot do they run?<br />

> Glitch<br />

> Took a top-of-the-line model on a rural op and cooked an<br />

egg on it. No joke. It wasn’t necessary—just wanted to see<br />

if it would work.<br />

> Slamm-0!<br />

Kyle Jones (Order #16164256)<br />

58 DIPS & CHIPS >>


KILL CODE You had a real egg and you cooked it on your tech toy?<br />

> /dev/grrl<br />

> I had a lot of eggs as I was hiding out in a henhouse at the<br />

time. I ate so many, I’m kind of over them.<br />

> Slamm-0!<br />

BOOSTER CHIPS<br />

While MCT was putting technomancers through<br />

the black site torture program, Evo was using some<br />

of their newest assets to infiltrate and steal the research<br />

data MCT was gathering. Using biological<br />

readings from a myriad of tests, Evo managed to<br />

develop a simchip-based protocol that enhances<br />

certain aspects of a technomancer’s living persona<br />

through short bursts of BTL-level feeds. As you<br />

would expect, there’s a small risk of addiction due<br />

to to these feeds, but the addiction numbers were<br />

lower in test subjects, likely due to the focused nature<br />

and purpose of the chips. The chips come in<br />

four varieties, one for each aspect of the living persona,<br />

with basic grades of the chips available commercially.<br />

There are also some seriously ampedup<br />

versions on the streets that have cooler names<br />

thanks to their shady dealers. Overuse and mixing<br />

the chips can cause issues, but a troublesome<br />

headache is better than getting brainfried by IC.<br />

The big tech jump here is a slotless BTL. The<br />

chips have a series of pins with a mix of sensors<br />

and stimulators. When applied to the cranial region,<br />

the pins transmit the signal directly to the<br />

brain, like a single-spot trode. The chips need<br />

bare skin, meaning many technomancers who use<br />

them keep a patch of their scalp shaved rather<br />

than sticking the chips on their foreheads.<br />

> If you can look past the source of the initial research and<br />

the forces used to steal it, these chips are a handy little<br />

tool for technomancers everywhere. The headache claim<br />

might be brushing problems under the carpet, but I’ve<br />

found it’s more about usage at that point. If you run a<br />

bunch of those street chips together, you’re asking for a<br />

hurting, but the commercial boosters aren’t terrible.<br />

> Netcat<br />

> Be careful about picking up the commercial ones at your<br />

local Stuffer Shack in areas where technomancers aren’t<br />

wanted. You may not have a problem, or you may walk<br />

out the door to a group of thugs that got tipped off by<br />

the clerk. Not to mention the sales records getting sold<br />

or stolen and ending up in the hands of any number of<br />

hatred-filled policlubs.<br />

> Respec<br />

> I know Clockwork won’t mention it, despite his<br />

involvement, but a number of runner teams around the<br />

country have been contracted to swap real booster chips<br />

for fakes in stores. The grapevine claims that some have<br />

had their pins coated with DMSO and an unpleasant<br />

cocktail, but most just claim they don’t work. Care to<br />

comment, Clockwork?<br />

> Slamm-0!<br />

> Claims are bogus. Between Evo feeding the world a line<br />

of garbage about these and other corps jumping on the<br />

bandwagon with chemical-laced brain boosters and<br />

pitching the same effect, you’re all getting fed a load<br />

of garbage. I deal with my problems head on, not by<br />

poisoning them on the sly.<br />

> Clockwork<br />

> We all know better than to believe that!<br />

> Netcat<br />

BOOSTER CHIP RULES<br />

The rating of the booster chip adds directly to both the<br />

living persona attribute to which it is connected, increasing the<br />

limit, and to all dice pools where that attribute is involved. The<br />

modifier is never applied twice to the same test—for example,<br />

in a <strong>Matrix</strong> Defense Test that already involves the Firewall<br />

attribute, the dice pool increase for the related test would not<br />

also be applied, since Firewall was already increase. The chip<br />

requires a Simple Action to attach, and it runs for 2 Combat<br />

Turns. At the end of the chip’s duration, the chip inflicts (Rating)<br />

S damage, resisted by Body. For each other chip simultaneously<br />

in use, that damage increases by 2, meaning a technomancer<br />

running a series of Rating 4 chips would need to resist 10S, 8S,<br />

6S, and 4S as their durations ended.<br />

The chips have an Addiction Rating equal to the total rating<br />

in use, and a threshold of (2 + 1 for every additional chip in use).<br />

TYPE RATING AVAIL COST<br />

Attack<br />

Booster<br />

Sleaze<br />

Booster<br />

Data<br />

Processing<br />

Booster<br />

Firewall<br />

Booster<br />

Armor<br />

Defeating<br />

1–2 — Rating x 50¥<br />

1–2 — Rating x 50¥<br />

1–2 — Rating x 50¥<br />

1–2 — Rating x 50¥<br />

3-4 (Rating x 4)R Rating x 250¥<br />

Slick Willy 3–4 (Rating x 4)R Rating x 250¥<br />

Data Dynamo 3–4 (Rating x 4)R Rating x 250¥<br />

Fortified 3–4 (Rating x 4)R Rating x 250¥<br />


KILL CODE Great for those just out to do the job. They lack any kind<br />

of flexibility. Even the other locked designs have some<br />

program variability for tough spots. If you run with the N<br />

(or run with a decker with one), know that versatility is not<br />

on the menu.<br />

> Pistons<br />

FUCHI CYBER-EX SERIES<br />

Similar in design to the N-series, the Ex-series<br />

offers the same custom system design but instead<br />

of no processors to run programs, it offers<br />

a unique program sub-processor that allows a<br />

greater number of programs to be run. Despite<br />

the steep price tag, the programs aren’t included,<br />

but each system has enough memory to store<br />

twice the number it can run at any given time for<br />

those who want options. Purchasers appreciate<br />

the extra program capacity, even if it means sacrificing<br />

some of the capabilities of the deck itself.<br />

Programs aren’t included, despite the steep price<br />

tag, but the system has enough storage memory<br />

to hold as many as you can afford.<br />

> I like the thought here, and the heavy program load<br />

makes up a little for the lack of versatility. Then again, it<br />

also allows for a very focused device with some programs<br />

around to protect you long enough to run if things go<br />

south.<br />

> Pistons<br />

Kyle Jones (Order #16164256)<br />

60 DIPS & CHIPS >>


KILL CODE Careful trying to tweak the program complement on these.<br />

The hardware inside is specifically designed to prevent<br />

tampering. Plenty of deckers have turned their expensive<br />

tech into shiny junk by trying to swap out program blocks<br />

and missing a pin or two.<br />

> /dev/grrl<br />

HUNTER DECKS<br />

Similar to security decks, hunter decks are<br />

utilized by a unique class of newly developing<br />

electronic specialists known as E-Hunters. These<br />

cyber-security specialists are taking their work<br />

EX-SERIES RULES<br />

Ordering a custom setup costs the amounts listed below.<br />

For the Ex-series, a deck’s Device Rating determines the<br />

maximum rating of every other attribute, but it can run a number<br />

of programs equal to the Device Rating plus two.<br />

ATTRIBUTE COST AVAIL<br />

Deck Rating (Deck Rating x 2)R Rating x 10,000¥<br />

Attack — Rating^3 x 500¥<br />

Sleaze — Rating^2 x 500¥<br />

Data Processing — Rating^2 x 500¥<br />

Firewall (Rating x 4)R Rating^3 x 500¥<br />

on the offensive, focused on the new technosapients<br />

and e-critters (mostly the former, though<br />

the latter occasionally find themselves in similar<br />

habitats). These decks focus on one thing and one<br />

thing only: killing. Or more accurately, derezzing<br />

AIs and other purely electronic entities. They have<br />

their specific limitations and protections but are<br />

designed to be of limited use for regular hacking,<br />

and they are exemplary at the dangerous job of<br />

e-hunting, including being devoid of a sim-inhibitor,<br />

meaning they run on hot-sim all the time.<br />

Makes you fast and ready to rock and roll at any<br />

moment, but it also means you had better be at<br />

SECURITY DECK RULES<br />

All security decks come with special anti-tamper systems that brick the device if programs are changed. Changing a program<br />

block requires a Logic + Hardware [Mental] (Device Rating x 2, 1 hour) Extended Test. If any roll does not achieve any hits, the deck<br />

is bricked.<br />

MODEL RATING ATTACK SLEAZE DATA PROC. FIREWALL AVAIL COST<br />

Guard 2 3 1 2 4 3R 39,000¥<br />

Programs: Encryption<br />

Shield 4 4 1 3 5 6R 98,000¥<br />

Programs: Encryption, Shell<br />

Fortress 6 6 1 5 8 9R 377,000¥<br />

Programs: Encryption, Shell, Armor<br />

Great Wall 8 8 1 6 10 12R 774,000¥<br />

Programs: Encryption, Shell, Armor, Biofeedback Filter<br />


KILL CODE These are dangerous, plain and simple. They offer a lot of<br />

hitting power, solid protection, and no chance of sleazing<br />

your way out of trouble. If you go out operating with one<br />

of these, there’s only one way you’ll be dealing with your<br />

problems. Directly.<br />

> /dev/grrl<br />

SHADOW WARRIOR RULES<br />

This deck adds +1 limit for <strong>Matrix</strong> Sleaze actions, and a<br />

+1 to the Sleaze attribute when that is configured to be the<br />

highest attribute.<br />

EVO SUBLIME RULES<br />

When jacked in using VR, the decker faces challenges<br />

performing actions outside the <strong>Matrix</strong>. Any non-<strong>Matrix</strong> actions<br />

suffer a –10 dice pool modifier and –3 limit reduction (to a<br />

minimum of 1). It’s just enough control to pull out a cable to<br />

a physical machine that you are link-locked into, or fire wildly<br />

into melee.<br />

AZTECHNOLOGY<br />

SHADOW WARRIOR<br />

Building on the success of the Microtronica Azteca<br />

200, Aztechnology has produced an affordable<br />

deck that caters to deckers who don’t want<br />

to be seen.<br />

Exactly how Aztechnology optimized a deck for<br />

stealth in this way is a puzzle—they may have applied<br />

some of their research into technomancers,<br />

or they may have some insight, back door, or (most<br />

likely) leverage on the Grid Overwatch Division. Either<br />

way, they may have an advantage in the <strong>Matrix</strong><br />

for a while, until their competitors catch up.<br />

EVO SUBLIME<br />

Only available as an implanted deck, the Evo Sublime<br />

takes transhumanism to the next level by allowing<br />

VR hackers to take some limited actions in<br />

the physical world. Splitting attention across the<br />

<strong>Matrix</strong> and the meat world is distracting, and it<br />

requires significant concentration to perform actions<br />

outside VR.<br />

> This is more dangerous than it seems. The mix of feeds<br />

and poor control make almost any activity dangerous.<br />

Beware when trying to use this for more than just a little<br />

self-preservation by yanking your cord.<br />

> Glitch<br />

FAIRLIGHT DESTINY BLADE<br />

Fairlight has long been a leader in cutting-edge<br />

electronics, but their Excalibur range has been out<br />

Kyle Jones (Order #16164256)<br />

62 DIPS & CHIPS >>


KILL CODE


KILL CODE This program is straight trash-hacker software. If you can’t<br />

be bothered to run a baby monitor and know when you’re<br />

in trouble and instead would rather bring GOD down on<br />

some poor unsuspecting slob, don’t ever let me find out.<br />

I will rain down a hell far worse than the simple KO and<br />

pickup of GOD.<br />

> Glitch<br />

> Yeah, this. I appreciate people knowing this is out there,<br />

but seriously, if you want any hacker cred, don’t use this<br />

Kyle Jones (Order #16164256)<br />

64 DIPS & CHIPS >>


fragging cheatware. I don’t often agree with the corps,<br />

but making this thing equivalent to murder is legit in<br />

my book.<br />

> Bull<br />

> Thank you, white hats. For all of you real hackers out<br />

there, use this to your heart’s content. Pulling punches<br />

isn’t our job, and as long as GOD is going to keep coming<br />

down and acting with impunity, we can make a few cases<br />

to prove how recklessly those slitches play the game.<br />

They don’t care if they rain down black hammers like it’s<br />

monsoon season, and I’m not taking the blame for that.<br />

This program lets you skip eyeballing your baby monitor<br />

every half second and lets you know just when the drek<br />

hits the fan. If it never hits, it never hits, and that’s the goal<br />

anyway, but if we’ve gotta play by GOD’s rules, frag them<br />

if I’m playing anywhere close to nice, because they sure<br />

as frag don’t.<br />

> ICPK<br />

> You can think that all you want. But when you are keeping<br />

a low profile and some two-bit hacker uses a Cry Wolf and<br />

you’re the one they bring the brimstone down on, you’ll<br />

change your tune.<br />

> Respec<br />

> Seriously? Looking at the user data on an average<br />

grid like Emerald City and knowing the general runner<br />

community of Seattle, I can calculate the odds of this<br />

program hitting a fellow hacker, be they unassuming<br />

decker or a random techno, at about 100,000 to 1.<br />

Seeing as the number of deckers in Seattle who might<br />

use this program is also relatively low—well, you can<br />

take your “it happened to a friend of a friend” tale and<br />

go tell it to the gullible. My efforts are worth more than<br />

any average sheeple hack any day.<br />

> ICPK<br />

> Might not necessarily agree, but more varying viewpoints<br />

are nice. Glad you’re expanding access a little, guys.<br />

> /dev/grrl<br />

CYBERWARE<br />

AND BIOWARE<br />

It’s not a lot, but what I have lined up is high-quality.<br />

This is bleeding edge and I’ve got the docs on<br />

my rolodex app to make installs happen in almost<br />

every major sprawl around the globe.<br />

DATAJACK PLUS<br />

Every corp is trying to innovate a little to get a bit<br />

more of the market share. And then another corp<br />

takes their idea, re-labels it, and eventually, every<br />

CRY WOLF RULES<br />

corp has an offering, too, with almost the exact<br />

same features. The datajack plus is the latest in<br />

these efforts to get everyone to upgrade or buy<br />

the newest tech. Its basic functionality is identical<br />

to a standard datajack, offering a DNI link to<br />

devices and a filter to handle some of the local<br />

interference, but the Plus offers a small cache of<br />

memory and a processor system that links up<br />

with your commlink (or cyberdeck) with the ability<br />

to run programs. The d-plus system comes in<br />

a variety of processor speeds and cache sizes to<br />

offer a variety of options for the executive with<br />

an eye on the top spot or the electronic security<br />

specialist that needs an edge because the shadows<br />

keep getting faster and more deadly.<br />

> The jack-plus is becoming the crutch of wealthy wannabes,<br />

rather than the next step in the hacker evolution. Too many<br />

punks trying to use the myriad of programs instead of a<br />

quality deck or genuine skills.<br />

> Respec<br />

> That’s one point of view. Using these advances isn’t a<br />

crutch for everyone who gets the plus. Some people just<br />

want to have that extra edge, and the plus offers a whole<br />

porcupine worth of edges.<br />

> Pistons<br />

DATAJACK PLUS RULES<br />

The datajack plus offers space for a number of Common and<br />

Hacking programs. When connected to a commlink or cyberdeck,<br />

the datajack plus can run a number of Common and Hacking<br />

programs equal to its rating. The price includes [Rating] free<br />

programs from the dealer that come preloaded (gamemaster’s<br />

choice) but these can be changed. Maximum rating is 3.<br />

ESS AVAIL COST<br />

>> KILL CODE


KILL CODE Can’t say I know anyone with a system like this, but it<br />

can’t be easy to operate between the two realms. Even<br />

operating in an intense spam-zone can make the real<br />

world impossible to interact with—I can’t imagine a<br />

system that tries to merge the two worlds.<br />

> Balladeer<br />

CRANIAL SHIELD<br />

EARRS RULES<br />

The EARRS implant allows users to roll their <strong>Matrix</strong><br />

Initiative in a Physical encounter but limits the actions that<br />

can be performed. While running the EARRS implant, the user<br />

can move normally and perceive events in the physical world<br />

through their standard senses, but all Physical and Social<br />

Skill actions face a –10 dice pool modifier due to the system’s<br />

confusion of physical and <strong>Matrix</strong> input. <strong>Matrix</strong> Actions can be<br />

performed as normal.<br />

ESS AVAIL COST<br />

0.75 10R 30,000¥<br />

I’m only including this as a favor to a friend who<br />

wants people to know they exist. No one in their<br />

right mind would ever intentionally get one installed.<br />

The system is a series of emitters implanted<br />

into the skull. The emitters throw off a<br />

low-level interference signal that inhibits wireless<br />

connections between devices in the cranium<br />

and outside. A bypass, like a datajack, can be<br />

used for access, but all wireless connections fail.<br />

The system was supposedly designed to protect<br />

couriers from getting their headware hacked, but<br />

the existence of datalocks and the ability to shut<br />

down wireless capability made plenty of skeptics.<br />

Digging around for the original design traced the<br />

whole thing back to MCT, and some additional<br />

specs showed that the system also blocks technomancers<br />

from accessing the <strong>Matrix</strong>. So now<br />

we know why they made it.<br />

> There is no reason for this to exist. This is some of the<br />

most deplorable tech I have seen since cortex bombs.<br />

There are no good uses for this!<br />

> Netcat<br />

> I’ll probably catch flak for this, but here goes. The<br />

market for this implant is parents of technomancer<br />

kids. I’m not a proponent of this by any means, but it’s<br />

hard being a teenager and a technomancer. Or even<br />

being an adult and a technomancer. This implant is<br />

marketed as a way to shut off the overwhelming stream<br />

of signals constantly battering a young technomancer.<br />

It’s marketing, I know, and there are so many ways to<br />

protect them without cutting off access to a natural<br />

talent, but a lot of parents aren’t technomancers<br />

themselves and don’t understand. They just see it as<br />

something that is hurting their child, and they look to<br />

this as a permanent solution.<br />

> /dev/grrl<br />

> Those parents don’t deserve those kids.<br />

> Netcat<br />

> Here’s a growing business for you: hacking clinics that<br />

offer this “treatment” and then snatching kids before<br />

surgery. The jobs vary in pay depending on the delivery<br />

target for the kid. Delivering kids to a hooder looking to<br />

help a young techno brings in low pay, while selling them<br />

to a corp or (sorry, Orange Queen) a dragon pays better.<br />

Looking into who you’re working for is a good idea here,<br />

and before you go thinking about welching on the deal<br />

in order to keep a young technomancer out of the corp’s<br />

hands, remember they’re a person and will need to be<br />

taken care of. Not to mention the fact that most of them<br />

are already convinced by mom and dad that this is the<br />

best solution to help them with their condition.<br />

> Fianchetto<br />

Kyle Jones (Order #16164256)<br />

66 DIPS & CHIPS >>


KILL CODE Great. Now we can make freaks.<br />

> Clockwork<br />

> Already could. Isn’t that how you got here?<br />

> Respec<br />

> The stealth hacking options here are the real advantage<br />

this allows. I’m as unhappy as the next person that the<br />

megacorps do all sorts of testing and even torture people<br />

to get their info, but to let those people die in vain seems<br />

a far worse offense. Better to arm ourselves with the tech<br />

and tools they discover and use it against them.<br />

> /dev/grrl<br />

IC<br />

ESS AVAIL COST<br />

0.5 10 15,000¥<br />

Sometimes it’s not just good to know what we’re<br />

able to buy, but also what might be sliding onto<br />

the market to make your lives hell. I don’t offer<br />

any kind of real sales figures here, as the corps<br />

that make this stuff code it all in house, and when<br />

they sell it, we’re talking corp-to-corp deals,<br />

which are not my area of expertise.<br />

FLICKER<br />

Megacorporations have been developing IC for a<br />

long time and have largely focused on lethal attacks<br />

or significant interference. Last year, NYPD,<br />

Inc. gained a non-lethal contract to protect several<br />

buildings in Boston, and they included cybersecurity<br />

as a part of that package. Unwilling to<br />

just dump a hacker, the boys in blue spent some<br />

money on non-lethal IC that also allows them to<br />

study your avatar. Almost as soon as the IC was<br />

developed, it was licensed to almost everyone on<br />

the <strong>Matrix</strong>.<br />

FLICKER RULES<br />

Attack: Host Rating x 2 [Attack] v. Logic + Firewall<br />

Flicker link-locks you when it hits and puts a mark on you. If<br />

you have two marks on you, it disconnects you from the <strong>Matrix</strong>,<br />

dealing dumpshock damage if appropriate. Although you<br />

have been disconnected from the <strong>Matrix</strong>, your avatar doesn’t<br />

disappear until you log back in using the same device, or after<br />

[Device Rating] rounds. It remains where you left it, unable to<br />

act, while other IC can attempt to trace your location or analyze<br />

your avatar.<br />

SLEUTHER<br />

With the development of Flicker providing a minor<br />

marketing boost, Lone Star began developing their<br />

own non-lethal IC. Instead of focusing on an intruder’s<br />

avatar, Sleuther attempts to work out your habits<br />

and trackable characteristics from the trail your<br />

virtual presence leaves. The IC has had limited success<br />

in stopping hackers but has provided the contact<br />

details of many hackers that can be found—and<br />

possibly recruited—by the Star.<br />

SLEUTHER RULES<br />

Attack: Host Rating x 2 [Attack] v. Logic + Firewall<br />

This IC puts a mark on you if it hits. Each mark provides a<br />

legitimate user with +2 dice on any <strong>Matrix</strong> Search actions or<br />

<strong>Matrix</strong> Perception tests involving you. It works by applying<br />

different behavioral algorithms and heuristics to try to work out<br />

what sort of person you are. This IC also installs tracker code<br />

into your avatar, enabling the IC to identify which grids and<br />

hosts your avatar visits after the mark lands. Marks from this IC<br />

may be removed normally.<br />


KILL CODE The Flow is meant to return “anonymous” usage statistics<br />

back to Horizon to fold back into the algorithm, but any<br />

decent decker can disable that in a variety of ways.<br />

> Slamm-0!<br />

WUXING<br />

FREQUENCY COMMLINK<br />

Wuxing may not have been as deeply embroiled<br />

in the “technomancer controversy” as other<br />

megacorps, but they must have engaged in some<br />

experimentation, as shown by this commlink.<br />

Kyle Jones (Order #16164256)<br />

68 DIPS & CHIPS >>


KILL CODE


KILL CODE Okay, gotta ask the obvious: who, what, and why<br />

should I care?<br />

> Stone<br />

> Interestingly enough, my searches found next to nothing.<br />

What I did find says that the CEO, COO, CFO, and “lead<br />

R&D programmer” is one E.D. “Ed” Lockwood. His<br />

home address is in Detroit, but it’s three years old and<br />

has no connections to a business. Lockwood is a former<br />

Ares tech who worked on the Excalibur, and from the<br />

information I found, he was basically one of several<br />

sacrificial lambs when the project went down the<br />

drekker. Other than that, nothing.<br />

> Netcat<br />

> So this guy is what, doing all this out of his garage or<br />

something?<br />

> X-Prime<br />

> Yeah, I think he is. Only way you can get their products<br />

is online.<br />

> Netcat<br />

PANTHEON INDUSTRIES<br />

PI-TAC “TACTICAL APPS”<br />

Introduced by Pantheon Industries only six<br />

months ago, tactical apps (tac-apps) are meant<br />

to both enhance a PI-TAC and allow users to customize<br />

it for their specific needs or mission profile.<br />

They function like programs in a cyberdeck<br />

but are coded to operate exclusively in PI-Tac<br />

units and cannot be used in cyberdecks that do<br />

not have a linked PI-Tac. All bonuses and benefits<br />

of a tac-app are cumulative with bonuses from<br />

a linked cyberdeck or RCC but are geared more<br />

toward decker usage.<br />

A PI-Tac master unit can load a number of tacapps<br />

equal to its rating plus two. Example: A level<br />

two PI-Tac can have four tac-apps loaded at any<br />

given time. Unlike cyberdecks and programs, it<br />

takes a Simple Action to unload a running tac-app<br />

and load a new one from storage.<br />

CO-PILOT: MK I, II, AND III<br />

One of the main features of Level III PI-Tacs<br />

is the network operator’s ability to take limited<br />

emergency control of a linked-in vehicle or<br />

drone. The Co-Pilot series of tac-apps takes that<br />

function a step further. Note: For these apps to<br />

work properly, a PI-Tac operator must have admin<br />

access and a wireless link to all target vehicles<br />

and drones.<br />

The MK I app is for Level III units and designed<br />

to give enhanced functions versus the standard<br />

benefits. With the MK I, an operator can operate<br />

the target vehicle or drone directly as if operating<br />

in cold-sim, assuming they have the necessary<br />

skill or skillsoft. However, control is less than optimal<br />

and inferior to a traditional rigger setup. Manufacturer<br />

warns that this program is best used only<br />

for emergencies or non-combat situations.<br />

> Yeah. Since when do we actually listen to the<br />

manufacturer’s warnings?<br />

> Chainmaker<br />

> This time we should. Based on my copy, it’s definitely not<br />

meant to replace a rigger system. I tested a drone swarm<br />

with it to see how far I could push. And sure enough,<br />

in simulated combat the signal started to degrade and<br />

control went down the drekker because the code couldn’t<br />

keep up. But desperate times …<br />

> Clockwork<br />

The MK II allows Level I and II PI-Tacs to remotely<br />

control a target vehicle and/or drone as if<br />

they were a basic Level III unit. However, MK I and<br />

II apps are currently incompatible with each other.<br />

> For being some kind of new “innovative” products, these<br />

tactical programs already seem to have some serious<br />

limitations.<br />

> Cayman<br />

Kyle Jones (Order #16164256)<br />

70 DIPS & CHIPS >>


PANTHEON INDUSTRIES<br />

“CO-PILOT” MK I<br />

>> KILL CODE Like any new tech, you have to make it work. Then make<br />

it better.<br />

> Rigger X<br />

> Also, “currently” incompatible. Someday, the future will<br />

be now.<br />

> Kane<br />

The MK III allows a PI-Tac operator to directly<br />

assist a pilot in operating their vehicle’s<br />

secondary systems, such as sensors or communications,<br />

allowing the pilot to concentrate on<br />

primary tasks. In emergencies, the PI-Tac operator<br />

can assist should one or more pilots become<br />

incapacitated. In extreme cases, the MK III allows<br />

a PI-Tac operator to take emergency control<br />

should all pilots become incapacitated and/<br />

or the auto-pilot systems become inoperative.<br />

> A chum in the 180 th IAR is testing these for the regiment<br />

and says that when two people are operating the same<br />

vehicle or drone together and running the MK III, they get<br />

the odd sensation of being cramped and crowded.<br />

> Turbo Bunny<br />

DOOR GUNNER<br />

Similar to the Co-Pilot, this app is specifically designed<br />

to give PI-Tac operators the ability to remotely<br />

operate powered weapon mounts (such<br />

as turrets) or launch weapons (such as missiles or<br />

rockets) on a linked vehicle. Because of the narrow<br />

focus of this program, there are no penalties<br />

associated with its use.<br />

ECM-WARRIOR<br />

Electronic warfare and electronic countermeasures<br />

continue to be mainstays of modern combat,<br />

so the ECM-Warrior tac-app is designed to<br />

give the PI-Tac operator some extra electronic<br />

ammo, whether defending against them or attacking<br />

with them.<br />

AVAIL<br />

COST<br />

12R 400¥<br />

<strong>Rules</strong>: Allows a Level III PI-Tac operator to control a target<br />

vehicle or drone as if by remote, using cold-sim. Additionally, all<br />

piloting skills have an automatic –2 penalty while operating the<br />

target vehicle in safe conditions, –3 in combat conditions.<br />

PANTHEON INDUSTRIES<br />

“CO-PILOT” MK II<br />

AVAIL<br />

COST<br />

12R 400¥<br />

<strong>Rules</strong>: Allows Level I and II operators to control drones as if<br />

in “captain’s chair mode.”<br />

PANTHEON INDUSTRIES<br />

“CO-PILOT” MK III<br />

AVAIL<br />

COST<br />

12R 400¥<br />

<strong>Rules</strong>: Allows operator to access vehicle’s secondary<br />

systems with no penalty and assist with Pilot tests at a –1<br />

dice pool penalty. If using this program as sole pilot, penalty<br />

increases to –3.<br />

PANTHEON INDUSTRIES<br />

“DOOR GUNNER”<br />

AVAIL<br />

COST<br />

12R 200¥<br />

<strong>Rules</strong>: No penalties for use; linked weapon must have<br />

smartlink and secure wireless connection. Not for use with<br />

drones. Operator must have necessary skill or skillsoft.<br />

PANTHEON INDUSTRIES<br />

“ECM-WARRIOR”<br />

AVAIL<br />

COST<br />

12R 200¥<br />

<strong>Rules</strong>: This program provides a bonus of +3 for all Electronic<br />

Warfare tests<br />


KILL CODE Several companies across the globe produce the same<br />

generic product, but with different names and logos. They<br />

all do the same thing, some for a better price.<br />

> Danger Sensei<br />

> And with varying quality, don’t forget that. But Pantheon’s<br />

Hard Case is specifically designed with the electronic<br />

warrior in mind and is produced under license by an outfit<br />

Kyle Jones (Order #16164256)<br />

72 DIPS & CHIPS >>


KILL CODE Red Anya<br />

> Nice piece of gear, but is it really a good idea for any<br />

decker—or rigger, for that matter—to go full VR in the<br />

middle of a firefight? No thanks, not for me.<br />

> Pistons<br />

SPINRAD GLOBAL/<br />

PANTHEON INDUSTRIES<br />

MERCURY-ALPHA BATTLEFIELD<br />

SIGNAL BOOSTER<br />

On the wireless battlefields of the Sixth World,<br />

electronic warfare has greater significance than<br />

ever before. Cutting off or limiting an enemy’s<br />

ability to communicate while maintaining one’s<br />

own is often a decisive factor in victory. The Mercury-Alpha<br />

Signal Booster is designed to give PI-<br />

Tac users/operators and their commanders additional<br />

advantages during combat or for normal<br />

use in remote areas.<br />

The Mercury-Alpha consists of three components:<br />

a main unit (or brain) that contains all necessary<br />

hardware, software, batteries, and data ports;<br />

a foldable/detachable micro-dish transmitter; and<br />

an optional, hardened fiber-optic cable that can<br />

directly link the brain and transmitter together.<br />

The brain weighs only about 450g and comes in<br />

a variety of shapes, depending on the user’s preference.<br />

It attaches directly to a PI-Tac master unit,<br />

commlink, cyberdeck, or RCC.<br />

When in use, the Mercury-Alpha has three distinct<br />

modes. The first is passive mode, which is<br />

specifically designed to overcome most normal<br />

obstacles, such as extreme distance or natural ob-<br />

PANTHEON HARD CASE CCOB<br />

ARMOR CAPACITY AVAIL COST<br />

12/14* 8 12R 1,700¥<br />

<strong>Rules</strong>: Provides protection for contents against physical<br />

damage only. Does not stack with other armor.<br />

Standard Upgrades: Drag handle, internal armored shell<br />

(for RCC or cyberdecks) [14]*, 3 micro-hardpoints, quick-charge<br />

battery pack.<br />

GENERIC CCOB<br />

ARMOR CAPACITY AVAIL COST<br />

8 8 10 1,000¥<br />

<strong>Rules</strong>: Does not stack with other armor<br />

Standard Upgrades: Drag handle, micro-hardpoint, weapon<br />

holster (SMG, shotgun, or assault rifle), quick-access medkit<br />

pouch (up to Rating 4).<br />

PERSONAL DRONE RACK<br />

AVAIL<br />

COST<br />

12R 500¥<br />

<strong>Rules</strong>: Can mount 3 micro drones or one small drone.<br />

Requires one micro-hardpoint.<br />


KILL CODE Details are still hush-hush, but what I’ve been able to dig<br />

up is that Pantheon agreed to license the design and the<br />

operating system code in exchange for SG manufacturing.<br />

And of course, some corps are not happy about this.<br />

> Pistons<br />

> Of course not, since someone who is not them is making<br />

money off their products! Only a matter of time before<br />

someone goes after Pantheon. If they can find them.<br />

> Mr. Bonds<br />

PANTHEON INDUSTRIES<br />

“MERCURY-ALPHA”<br />

BATTLEFIELD SIGNAL BOOSTER<br />

DR AVAIL COST<br />

5 12R 3,500¥<br />

<strong>Rules</strong>: Can only be used in one mode at a time; switching<br />

modes is a Simple Action. In passive mode, provides a +4 dice pool<br />

bonus against all sources of noise and doubles effective range.<br />

In defensive and aggressive modes, provides +2 for pertinent<br />

Electronic Warfare tests. Linked PI-Tac units can also distribute<br />

some or all of their +2 bonuses to assist other operators without<br />

a teamwork test; this requires a Simple Action. All functions and<br />

bonuses are cumulative with tactical programs and associated<br />

devices such as satellite links and re-trans units.<br />

AVAIL<br />

PANTHEON INDUSTRIES<br />

MICRO-DISH TRANSMITTER<br />

COST<br />

10R 1,200¥<br />

CYBERDECKS EX-SERIES<br />

DECK COST AVAIL<br />

Deck Rating (Deck Rating x 2)R Rating x 10,000¥<br />

Attack — Rating^3 x 500¥<br />

Sleaze — Rating^2 x 500¥<br />

Data Processing — Rating^2 x 500¥<br />

Firewall (Rating x 4)R Rating^3 x 500¥<br />

AMMO<br />

TYPE<br />

DAMAGE<br />

MOD<br />

AP<br />

MOD<br />

AVAIL<br />

COST (PER<br />

10 ROUNDS)<br />

E0-E0 — — 5R 50¥*<br />

E0-E0 Rifle –4 –4 5R 100¥<br />

Fuzzy rounds<br />

LP, MP, AR 10R 30¥<br />

HP, SMG, S 12R 50¥<br />

Looper<br />

1 7R 20¥<br />

2 8R 30¥<br />

3 9R 40¥<br />

4 10R 50¥<br />

5 11R 100¥<br />

6 12R 200¥<br />

Zapper rounds +0M — 12R 140¥<br />

ARROWLINK<br />

TYPE AVAIL COST<br />

50m 6R 25¥<br />

100m 8R 75¥<br />

200m 10R 200¥<br />

500m 12R 400¥<br />

GRENADES<br />

TYPE AVAIL COST<br />

CoS 10R 500¥<br />

Douser (Rating x 2)F Rating x 50¥<br />

Fuzzy 10R 20¥ x Power<br />

DumDum (Rating x 2)R Rating x 50¥<br />

CYBERDECKS N-SERIES<br />

DECK COST AVAIL<br />

Deck Rating (Deck Rating x 2)R Rating x 5,000¥<br />

Attack — Rating^3 x 500¥<br />

Sleaze — Rating^2 x 500¥<br />

Data Processing — Rating^2 x 500¥<br />

Firewall — Rating^3 x 500¥<br />

CYBERWARE & BIOWARE<br />

ITEM ESS AVAIL COST<br />

BioLink 0.5 10 15,000¥<br />

Cranial Shield 0.5 12 5,000¥<br />

Datajack plus 0.15 4 Rating x 3,500¥<br />

EARRS 0.75 10R 30,000¥<br />

Kyle Jones (Order #16164256)<br />

74 DIPS & CHIPS >>


SECURITY CYBERDECKS<br />

MODEL RATING ATT SLEAZE<br />

DATA<br />

PROC.<br />

FIRE-<br />

WALL AVAIL COST<br />

Guard 2 3 1 2 4 3R 39,000¥<br />

Programs: Encryption<br />

Shield 4 4 1 3 5 6R 98,000¥<br />

Programs: Encryption, Shell<br />

Fortress 6 6 1 5 8 9R 377,000¥<br />

Programs: Encryption, Shell, Armor<br />

Great Wall 8 8 1 6 10 12R 774,000¥<br />

Programs: Encryption, Shell, Armor, Biofeedback Filter<br />

HUNTER CYBERDECKS<br />

MODEL RATING ATT SLEAZE<br />

DATA<br />

PROC.<br />

FIRE-<br />

WALL AVAIL COST<br />

Fox 2 4 1 3 4 4R 68,500¥<br />

Programs: Track, Shell, Hammer<br />

Wolf 4 5 1 4 5 8R 133,000¥<br />

Programs: Track, Shell, Hammer, Decryption<br />

Tiger 6 8 1 6 8 12R 530,000¥<br />

Programs: Track, Shell, Hammer, Decryption, Hammer<br />

Shark 8 10 1 8 10 16R 1,032,000¥<br />

Programs: Track, Shell, Hammer, Decryption, Hammer, Mugger, Fork<br />

MISC. CYBERDECKS<br />

MODEL<br />

RATING<br />

ATTRIBUTE<br />

ARRAY PROGRAMS AVAIL COST<br />

Shadow Warrior 3 6 5 4 3 3 10R 225,000¥<br />

Sublime 4 7 6 5 5 4 12R 375,000¥<br />

Destiny Blade 4 7 6 5 5 4 12R 400,000¥<br />

Defender 5 8 7 5 5 5 14R 560,000¥<br />

Sleeper 4 7 5 5 4 4 14F 375,000¥<br />

COMMLINKS & RCC<br />

GEAR RATING DATA PROC. FIREWALL AVAIL COST<br />

Cyber-6RCC 5 5 5 12R 72,000¥<br />

Skirmisher 4 5 5 8R 50,000¥<br />

Last Chance 3 3 3 11 5,000¥<br />

Frequency 4 4 4 10 3,500¥<br />

Flow 5 5 5 12 4,000¥<br />

ARMOR<br />

ITEM ARM CAP AVAIL COST<br />

Generic CCOB 8 8 10 1,000¥<br />

Hard Case<br />

CCOB<br />

12/14* 8 12R 1,700¥<br />

MISC. ITEMS<br />

>> KILL CODE


KILL CODE<br />

DISK JOCKEYS &<br />

LIGHTSTREAM RIDERS<br />

There are a million hosts on the <strong>Matrix</strong>, and billions<br />

upon billions of data points. Most of them are trivial<br />

or obvious, which means one of the traits of a<br />

quality hacker is to sort through the dross to find<br />

the gold. There is no one right way to do this—the<br />

right way is the one that works. This chapter has<br />

qualities, complex forms, and Life Modules to<br />

help hackers make themselves individual, distinct,<br />

and capable of finding the <strong>Matrix</strong>’s most valuable<br />

and tightly guarded secrets.<br />

POSITIVE<br />

QUALITIES<br />

DECK BUILDER<br />

COST: 4 KARMA<br />

The character has been messing around with<br />

tech their whole life; it was only a matter of time<br />

before they found a way to push their deck’s hardware<br />

further so that it could do more than it was<br />

supposed to.<br />

The character may install 1 additional cyberdeck<br />

module (p. 64, Data Trails) into their deck.<br />

This quality may only be selected once.<br />

IMPENETRABLE LOGIC<br />

COST: 3 KARMA<br />

Some would call it precognition—this hacker<br />

calls it quick thinking. When things in the <strong>Matrix</strong><br />

start going sideways, they keep their cool, maintain<br />

their focus, and think their way around the<br />

problem. Which may well be some brutal IC bearing<br />

down on them.<br />

This quality allows the character to use their<br />

Logic in place of their Willpower attribute while<br />

using <strong>Matrix</strong> Full Defense.<br />

ROOTKIT<br />

COST: 8 KARMA<br />

The character knows how to find the crack in<br />

any system, even if it’s a minuscule one. Getting<br />

the code just right, and hitting that chain on its<br />

weakest link take a lot of mental fortitude and accuracy.<br />

A helping of luck doesn’t hurt.<br />

As a Free Action, a character may take a –8 penalty<br />

to their dice pool when they are performing<br />

a Data Spike or Resonance Spike Action one that<br />

same turn. On a successful hit, the character may<br />

add their device rating to the DV of the attack.<br />

SILENCE IS GOLDEN<br />

COST: 9 KARMA<br />

It might be anemia from all that soykaf, or perhaps<br />

there’s something about the character—maybe<br />

the <strong>Matrix</strong> just likes them. Whatever the case,<br />

for some reason the ever-present noise of the <strong>Matrix</strong><br />

is muted near this character.<br />

The noise penalty for the character and anyone<br />

within ten meters of them is reduced by 2. Anyone<br />

outside the radius who attempts to connect<br />

to the character does not benefit from the noise<br />

reduction.<br />

NEGATIVE<br />

QUALITIES<br />

AVRSE<br />

BONUS: 9 KARMA<br />

The character knows too many hackers who<br />

have been taken out while in VR, and they never<br />

saw it coming. They see VR as a trap—how can you<br />

get out of a bad situation if your consciousness is<br />

not firmly inside your body? Unwilling to take that<br />

sort of risk, the character has made AR their mode<br />

of choice.<br />

Kyle Jones (Order #16164256)<br />

76 DISK JOCKEYS & LIGHTSTREAM RIDERS >>


When in VR, the character suffers a –4 penalty<br />

to all actions if they are not in a secure location<br />

(such as a secured lair or safehouse). This location<br />

must be a place that they believe will not offer access<br />

to anyone besides themselves and their closest<br />

allies.<br />

BASEMENT DWELLER<br />

BONUS: 8 KARMA<br />

The character didn’t have a lot of friends when<br />

they were a kid … and now they still don’t have that<br />

many. What friends the character has tend to be<br />

on the <strong>Matrix</strong>, and the character’s social anxiety<br />

prompts them to keep it that way. Basically, people<br />

in real life are unpredictable and scary, and the<br />

character would rather interface from the comfort<br />

of their home.<br />

The character suffers a –2 dice pool modifier for<br />

all Social tests when meeting a someone in person<br />

for the first time. This modifier does not apply to<br />

second and subsequent encounters.<br />

BIG BABY<br />

BONUS: 4 KARMA<br />

Pain is a fact of life in the Sixth World, and shadowrunners<br />

know that better than most. While most<br />

runners accept that they are going to get hurt and<br />

are prepared to deal with it, others flinch from the<br />

possibility of damage, and this gets more severe<br />

each time they actually get hurt. When they’re<br />

out on the job, if they are burned, shot, zapped,<br />

punched, or otherwise damaged, the character<br />

becomes extremely reluctant to rejoin the fray.<br />

When a character with this quality is dealt Physical<br />

damage, they suffer a –1 penalty to combat<br />

dice pools until the enemy or obstacle that dealt<br />

the damage is overcome or destroyed.<br />

BUDDY SYSTEM<br />

BONUS: 9 KARMA<br />

Every runner knows that working with a team is<br />

always safer than acting alone. Because of stories<br />

they’ve heard or personal experience, the character<br />

gets anxious when no one’s watching their back.<br />

The character suffers a –2 to all <strong>Matrix</strong> actions<br />

other than <strong>Matrix</strong> Perception and the Hide action if<br />

they are alone, or a –1 penalty if they have an agent<br />

slotted in or a sprite compiled to back them up.<br />

DISCOMBOBULATED<br />

BONUS: 12 KARMA<br />

Whoever thought up simsense was a genius. A<br />

character with this quality doesn’t want to imagine<br />

life without it, especially because everything is a<br />

little too real. Characters who suffer from discombobulation<br />

experience feelings of disorientation<br />

whenever they work in the physical world, without<br />

virtual reality to steady their all-too-tactile hands.<br />

The character receives a –2 dice pool modifier<br />

to all tests when acting outside of AR or VR.<br />

DOWN THE RABBIT HOLE<br />

BONUS: 2 KARMA (MAX 4)<br />

The character is a sucker for clickbait, even<br />

when it’s obvious that it has nothing to do with the<br />

search they’re pursuing. They’ll start searching for<br />

building schematics for a heist, and end reading<br />

rumors about Dunkelzahn’s assassination. How<br />

did the search lead them there? No idea, but at<br />

least they learned a lot of rubbish along the way.<br />

For each level of Down the Rabbit Hole (maximum<br />

4), reduce the number of 1s necessary to roll<br />

a glitch by one whenever the character attempts<br />

to search the <strong>Matrix</strong> (so that on a roll of 8 dice with<br />

two levels of the quality, the character can glitch<br />

with only three 1s, instead of the normal five).<br />

The gamemaster may also require the character<br />


KILL CODE >


KILL CODE


KILL CODE >


KILL CODE


PARALLEL<br />

PROCESSING<br />

BY AMY VEERES<br />

Respec stared up at the ceiling in thought, reclining<br />

in the rear of Netcat’s Econovan. Their transport for<br />

tonight’s run was an inconspicuous panel van loaded<br />

with medkits, tools, hidden guns, emergency commlinks,<br />

and most importantly, the object Respec was<br />

lounging on while Netcat drove. It was a surprisingly<br />

comfortable sofa for extra passengers, willing or<br />

otherwise—definitely a step up from the hard-plastic<br />

ambulance seats found in most shadowrunner transports.<br />

And way more comfortable to lay down on.<br />

For a moment, the absurdity of her situation struck<br />

Respec. Netcat had far more experience than her,<br />

so it seemed natural to let her take the lead. Except<br />

for the fact that Respec was at least fifty years older<br />

than the other technomancer. The first-generation elf<br />

pinched the bridge of her nose, realizing this was a<br />

problem that an astronomically low number of people<br />

could ever relate to. It was her burden to bear.<br />

She climbed out of the van’s rear, having uploaded<br />

the mission parameters, required passcodes, and<br />

other data from the prep stage to a nanomemory<br />

tattoo between her toes. Nobody but weirdos bother<br />

to look there. Netcat was next out. Both of them<br />

wore dark armored clothing that might be passable<br />

as something a nightshift security agent might wear,<br />

though with no colors or logos specific to their target.<br />

On Respec’s hip rested a completely average-looking<br />

commlink. Specifically, the kind security guards<br />

at the Makoto Shiranui Memorial Hospital, Brought<br />

To You By Mitsuhama Computer Technologies were<br />

issued. The pair checked each other’s disguises before<br />

walking in opposite directions toward separate<br />

hospital entrances, outerwear for the chilly February<br />

night concealing weapons and other contraband. In<br />

a private link, they reviewed their plan.<br />

<br />

<br />

Respec winced in meatspace, doing her best to<br />

focus back on the <strong>Matrix</strong> and ignore the chill of the<br />

night blowing through her trenchcoat.<br />

> PARALLEL PROCESSING


virtuakinetic children. Test their level of technomancy<br />

and decide whether to keep them for further study<br />

or send them overseas for experiments.> The taller<br />

elf turned a pale green as AROs she had uncovered<br />

of the experiments flashed in front of her. Respec<br />

looked ready to vomit before downing a handful of<br />

pills from one of her coat’s pockets, dosing herself<br />

with an antinausea med that returned her face to its<br />

normal pasty pallor. She went back to her message.<br />

Respec closed her eyes and<br />

placed a hand over the display, just above the biometric<br />

scanner. She focused her mind and broke<br />

through the wave of fading washing past her as her<br />

complex forms went to work. The door opened with<br />

Respec none the worse for wear.<br />

Meanwhile, one of Netcat’s sprites flew into the<br />

first security terminal she encountered, and in just a<br />

couple seconds, the display welcomed Guard #631<br />

for her night shift. The tacsoft indicated to both of<br />

them that the closest doors were unlocked, so Netcat<br />

continued reviewing the details. <br />

The avatar of Respec in Netcat’s periphery, a silver-haired<br />

woman from some positively ancient simgame,<br />

gave a shaky thumb up. <br />

Netcat’s avatar, her real-life self with her features<br />

disguised in a green aura, recoiled suddenly. Netcat shook her head in the real world<br />

and began preparing a new array of sprites, these<br />

ones taking the form of glowing datachips, as was<br />

her habit. Respec likewise prepared herself, using a<br />

pistol-slide to deposit an array of datachips in her<br />

hands. Crushing them in a silent prayer to 01, she<br />

used the ritual to gather focus and put her concentration<br />

where it needed to be.<br />

Netcat messaged, while<br />

Respec was still threading a complex form to open<br />

the lock on her entrance. She eventually caught up to<br />

Netcat, who waited with an agitated look but offered<br />

no comment. They silently exited the dark, empty<br />

lobby, entering the hospital to begin their rescue<br />

mission.<br />

Respec began by connecting to the hospital’s<br />

host, another complex form shielding her from the<br />

spider’s eyes as she edited herself out of camera<br />

feeds in real time, meeting Netcat in a corner undetected<br />

by any security devices. The two squatted and<br />

watched opposite ends of the hallway, both ready to<br />

draw a weapon if a guard came along. Respec had<br />

brought long-range stun devices among what she<br />

called “some other stuff for emergencies,” while<br />

Netcat kept a light pistol—silenced, of course—in a<br />

shoulder holster beneath her jacket.<br />

Respec inquired, staring down<br />

through the darkness at the end of the hallway.<br />

Netcat couldn’t hide the smile poking<br />

at the corners of her mouth. Respec understood—<br />

technos weren’t expected to display any physical<br />

skills, so when you got a chance to flash some of<br />

them, you took it.<br />

Respec followed behind Netcat, who led her down<br />

the hall, staying one step ahead of the rent-a-cops<br />

and the spider. By the time they made it to the firstfloor<br />

security room (where the spider was based), the<br />

map Netcat had acquired before the run appeared on<br />

their AR displays. Flashing dots revealed the locations<br />

of the guards, while lighter circles around each of<br />

them representing their sensory ranges. None were<br />

near the security room they were about to breach.<br />

Respec drew her weapon and nodded to her partner.<br />

Netcat grabbed the door handle. One of her<br />

sprites flew into the door, and it unlocked silently.<br />

She pushed it open, and Respec fired three darts<br />

into the back of the dwarf inside, who fell out of his<br />

chair with a soft thud. Respec let her partner in after<br />

the dwarf was incapacitated, kneeling over his prone<br />

form while Netcat took his seat and began diverting<br />

security.<br />

Respec<br />

inquired, bricking the unconscious spider’s cyberdeck,<br />

emergency commlink, and any cyberware that<br />

looked like it might make her life more difficult.<br />

<br />

<br />

Netcat’s text actually paused. Both of the elves’ fingers<br />

brushed across opposite ends of the security terminal,<br />

enough to establish a connection. Before entering<br />

the building’s host, Netcat “spoke” again.<br />

<br />

>> PARALLEL PROCESSING


In VR, their icons appeared next to each other<br />

inside the hospital’s host. Respec conjured up the<br />

map again, this time showing each floor. Netcat<br />

stopped preparing her hack and watched her partner<br />

curiously.<br />

Respec sent.<br />

Respec produced some indeterminate data from<br />

inside her icon and pressed it into the security terminal’s<br />

icon. Eventually, it sunk into the transparent<br />

block, which lit up green. From there, she typed<br />

furiously; in reality, and in VR, a message went out<br />

through the hospital’s PA system.<br />

Words rang out. “Security personnel report to the<br />

fifth floor for a code gold. Repeat, code gold on the<br />

fifth floor. Further instructions will be given on arrival.”<br />

The message then repeated in Japanese.<br />

The system would also send similar text messages<br />

to all security personnel. “<strong>Code</strong> gold” meant a<br />

high-priority, high-security individual was coming in,<br />

the type of person who should be the focus of security<br />

efforts. It was the type of distraction that would<br />

only last until everyone figured out it was fake, but<br />

that should be long enough.<br />

Netcat and Respec turned back to the map, watching<br />

as the dots Respec highlighted rushed to the top<br />

floor. Once the last one had left the elevator, Respec<br />

turned around and continued the second stage of her<br />

plan.<br />

she sent after a few moments.<br />

Netcat asked. There was, of<br />

course, no tone on the brief text, but Respec imagined<br />

she could sense the trepidation.<br />

<br />

The two technomancers returned to their meat<br />

bodies. Respec tried not to look too pleased with<br />

herself.<br />

Netcat did not let her stay too self-satisfied. She<br />

spoke aloud for a change of pace. “Just remember,<br />

not every guard went to the fifth floor. You got some<br />

out of the way, but we still might run into trouble.”<br />

She patted Respec’s shoulder as she walked by, then<br />

gathered their things and left the security room. Respec<br />

did the same trick on the terminal and the security<br />

room’s lock on the way out, keeping the spider’s<br />

movements restricted. Assuming he woke up before<br />

the job was done.<br />

The two technomancers made their way to the<br />

hidden basement access. They moved quickly and<br />

smoothly. What security hadn’t gone to the fifth floor<br />

did not show up in their path, and the spider was<br />

down for the count. This would probably be the easiest<br />

stretch of the run.<br />

Halfway down the hall, Respec began laying out a set<br />

of palm-sized metallic devices, two stuck to the walls<br />

and one on the floor. As she finished up, she paused<br />

and breathed deeply. Preparing herself. Waiting for the<br />

devices to do what they were supposed to do.<br />

After long enough for the silence to become awkward,<br />

Respec picked up the devices and pointed to<br />

an inconspicuous closet door. <br />

Netcat didn’t say anything, though her usual stoic<br />

expression softened somewhat.<br />

“I don’t know what this is going to be, exactly,” she<br />

said aloud. “It’s not going to be good. They never pay<br />

us to break into places that are good.”<br />

“It will be the job, and we’ll deal with whatever it<br />

is. And later, we’ll erase from our memories whatever<br />

we can’t bear to keep.”<br />

Respec’s fingers brushed across the bezel of<br />

the biometric/keycard combination lock. The panel<br />

turned green, and the last of the sprite cluster Netcat<br />

compiled at the beginning of the run rushed through<br />

the widening crack to disable the gun turret on the<br />

other side of the door.<br />

<br />

Respec took up the rear, holstering her stungun.<br />

Netcat led the way<br />

through a dank hallway to an elevator. They entered,<br />

and as they sped downwards, Respec’s device pinged<br />

inside her bag.<br />

<br />

After Netcat received the message, she nodded<br />

and drew her Predator V, while Respec took out<br />

her two-generations-old Predator III.<br />

A few minutes and a half-dozen floors later, the<br />

elevator opened into a dimly lit, suffocatingly sterile<br />

hallway. Before they had a chance to step off of<br />

the elevator, they were stopped by a wave of miasma<br />

code spreading through the building’s host into their<br />

PANs and resonance link. Netcat tried to send a message,<br />

but all that came out was discordant noise. So<br />

they turned again to their voices<br />

“That’s one hell of a drone.”<br />

“Are we totally sure it’s a drone?”<br />

The conversation was cut short by the screech<br />

of metal scraping plascrete floors. Heavy footsteps<br />

combined with loud servomotors and metallic<br />

sounds joined them as the creature patrolling the<br />

Kyle Jones (Order #16164256)<br />

84 >> PARALLEL PROCESSING


halls turned a corner, trudging along a path walked<br />

so often that a pattern was worn into the hard tiles.<br />

In spite of her low-light vision, Respec found herself<br />

unable to focus on the creature’s form as it rounded<br />

the corner. It was armored, bulky, and gave off a<br />

jaw-aching burr of dissonant noise.<br />

“We should have brought more hardware than<br />

a stun-gun and a pistol each. How are we going to<br />

bring down that … thing? And if it gets close … I don’t<br />

even want to think about it.”<br />

Netcat holstered her pistol and shook her head.<br />

Respec desperately tried to urge an idea to leap from<br />

somewhere—anywhere—into her brain.<br />

Netcat spoke before any idea arrived. “We can’t<br />

scrub the mission and come back with more firepower.<br />

Security will be on to us after that code gold<br />

stunt. This is our only chance.”<br />

“That’s great, but how are we supposed to deal<br />

with that biodrone?!”<br />

“I have a plan.” Netcat stood and flexed both<br />

knees. “Get ready to bolt. You can hear it turning the<br />

corner now.”<br />

Netcat was the first of the two to run for it, with<br />

Respec following and attempting to quell a rising<br />

panic. The pair’s footsteps attracted the cyberthing’s<br />

attention, but it couldn’t turn around. It could<br />

only trudge down the hall on the route laid out by<br />

its IR camera-eyes, passing bedridden children and<br />

adolescents who were hooked up to IVs and trodes<br />

linked to a master terminal at the end of the room.<br />

“All right, let’s get it done,” Netcat said. “Stop<br />

whatever the terminals are doing to the kids. I think<br />

I have something to hold the drone off.” Netcat<br />

spread her arms and waved them forward to direct<br />

flecks of AR data in front of her. Eventually, the errant<br />

code took the shape of a cartoonish knight wielding<br />

a sword and shield. It wasn’t like the tiny creatures<br />

she usually summoned—it was metahuman-size and<br />

ready to do battle.<br />

“Great form sprite, morkhan!” Once formed, the<br />

sprite rushed off to do battle with the biodrone,<br />

keeping it distracted while its summoner began unhooking<br />

the IVs.<br />

“Mor-what now?” Respec raised an eyebrow at<br />

Netcat while her AR avatar dealt with the agent keeping<br />

the test subjects in hot-sim VR.<br />

“The hell kind of elf doesn’t even know how to<br />

swear in Sperethiel?”<br />

“The kind whose parents were human. I don’t<br />

know! Swear in Japanese like the rest of us!” Respec<br />

continued to work on the code while Netcat finished<br />

with everything except the VR electrodes.<br />

Out of nowhere, the fight in the halls dragged into<br />

the lab, where the sprite, corrupted and falling apart<br />

from extended exposure to dissonance, was barely<br />

holding off something that was most certainly not a<br />

biodrone.<br />

The two shadowrunners could finally see what<br />

was between them and the exit. It was an ork woman<br />

covered in grimy metal plating, blades for hands, and<br />

oversized cyberlegs for balance. The only traces of<br />

her metahumanity were the ragged hair around her<br />

skull and the tusks sticking out of a lipless mouth. It<br />

was a dissonant cyberzombie. It had to be, because<br />

Respec did not want to consider what else the form<br />

in front of her might be.<br />

It hadn’t showed up at a good time. Netcat had<br />

fallen to her knees thanks to the fading brought on<br />

by her sprite’s destruction. The cyberzombie felt the<br />

weakness and turned to face her, raising a blade-arm.<br />

A deafening crack sounded out. As the great form<br />

sprite fell apart, the cyberzombie collapsed, sparks<br />

and brains flying from the hole where the back of its<br />

skull used to be.<br />

Respec’s gun was still smoking. Unable to hear<br />

over the ringing from the point-blank gunshot that<br />

took the cyberzombie down, she spoke in Resonance<br />

instead.<br />

<br />

Netcat laughed, a forced, nervous sound but still<br />

quite welcome at this moment. <br />

As the excitement faded, her smile softened.<br />

Respec started dragging the corpse into<br />

the hallway’s center column.<br />

Netcat finished unhooking their targets,<br />

knowing the job was only halfway over. Then<br />

she asked Respec a question that she clearly should<br />

have been ready for but was dismayed to find out<br />

she’s not.<br />

<br />

>> PARALLEL PROCESSING


KILL CODE<br />

DATA<br />

STREAMS<br />

POSTED BY: CLOCKWORK<br />

It’s been a few weeks, and since neither of the<br />

knife-ear toasterfuckers have had anything to say<br />

about recent developments, it looks like the honor<br />

of explaining what they’re up to now falls to<br />

me. I can’t in good conscience let you guys go<br />

without knowing the latest in expanding technomancer<br />

powers. Forewarned is forearmed and all<br />

that. But buckle up, because things in these parts<br />

aren’t getting any less scary.<br />

Those of you who aren’t completely fresh might<br />

remember five or six years ago, when technomancers<br />

had these things, streams, that basically<br />

worked like a mage’s traditions. They were something<br />

you had to watch out for, but they could go on<br />

page two of the dossier when you looked at the full<br />

range of technomancer threats. It wasn’t critical information.<br />

With the lovely Ms. de la Mar’s overhaul,<br />

the technos got a big power drop, and one of the<br />

things that seemingly became disconnected were<br />

these streams. What a happy day that was …<br />

Guess what? They’re back. Or at least, something<br />

similar enough I figure the name “stream” is<br />

as good a way to describe them as any. It’s like<br />

the <strong>Matrix</strong> is cheating, and not in our favor. Not<br />

to worry, JackPoint, because this time, I’m on your<br />

side. I’ll walk you through each and every permutation<br />

of technomancy and what it lets them do.<br />

All the better when you’re worrying about one<br />

flash-frying your targeting system without knowing<br />

you’re there, or turning your drones on you, or<br />

jumping three stories with off-the-rack cyberlegs.<br />

Think those were jokes? Tall tales? Think again.<br />

HOW THEY FLOW<br />

To borrow a cliché that was outdated when my<br />

dad was still alive, these ain’t your granddad’s<br />

streams. If I had to compare them to something<br />

magical (which I do, because I know it pisses<br />

off Respec), I’d compare them to adept ways instead<br />

of magical traditions. They’ve completely<br />

changed to fit a new role in the <strong>Matrix</strong>, or are<br />

possibly a different thing entirely, and I’m very<br />

sad to report that they’ve given technomancers<br />

whole new toolkits. They’re not just freaky mind<br />

deckers anymore. Now they can be freaky mind<br />

riggers, summon sprites like they’re going out of<br />

style, and even use some cyberware. Yeah, this<br />

sounds unbelievable, but keep reading. These are<br />

real. The intel is solid. Mitsuhama doesn’t play<br />

around with technomancer rumors.<br />

> And the other shoe drops. What do we think?<br />

> Slamm-0!<br />

> As long as he’s sharing and doing nothing malicious, I say<br />

we let him finish. Deal with him when he tries to act.<br />

> Bull<br />

> Agreed, begrudgingly.<br />

> Glitch<br />

SOURCERERS<br />

You could call these guys the old-school technomancers.<br />

Not Otaku old-school, but the first<br />

generation, where sprites were an afterthought<br />

and the novahot technos were slinging complex<br />

forms that no mundane code could keep up with.<br />

That’s what this stream is all about. They can<br />

thread harder, faster, and sustain more forms at<br />

once than their peers. Even worse, when they get<br />

to their Hyperthreading ability, I’m not sure even<br />

the best hardware and the best mind on this rock<br />

could match one of these freaks in sheer hacking<br />

ability. The only thing I can think of off the top<br />

of my head that might (key word: might) be able<br />

to outhack them is one of the abominations that<br />

technoshamans can summon, but that’s for the<br />

next section.<br />

Kyle Jones (Order #16164256)<br />

86 DATA STREAMS >>


Could you leave off the editorializing? Every time you say<br />

something like ‘abomination,’ I get worried you’re about<br />

to post your manifesto.<br />

> Glitch<br />

> To be honest, this is an excerpt from it. I could share the<br />

entire thing if you like.<br />

> Clockwork<br />

> No.<br />

> Glitch<br />

> It always helps to remember that Clockwork is acting as<br />

his own hype man for the tunes he’s trying to mix. In other<br />

words, see hyperbole for what it is.<br />

> Pistons<br />

If you have to start slinging code against one,<br />

I suggest putting them in a situation where they<br />

need to rely on sprites, or GOD is about to converge.<br />

That should counteract most of their cheats.<br />

And hey, even if the second case doesn’t solve<br />

your problems directly, there’s always the chance<br />

they’ll piss GOD off enough that an Avenging Angel<br />

gets sent in to blow the fragger to bits. Just<br />

make sure you aren’t in the same zip code as them<br />

when that happens. Of course, that’s only if you<br />

have to start slinging code. Ideally, you should just<br />

shoot them. Doesn’t matter how good a Sourcerer<br />

is, they still can’t hack a piece of copper-jacketed<br />

lead moving at nine hundred meters per second.<br />

TECHNOSHAMANS<br />

In case the name didn’t clue you in, this stream<br />

takes a more spiritual approach to technomancy.<br />

They may not be as good with complex forms<br />

as Sourcerers, but what they bring to the table is<br />

somehow more horrifying. Anyone who’s dealt<br />

with technomancers since the <strong>Matrix</strong> overhaul<br />

knows how bulldrek sprites are, and Technoshamans<br />

double down on that. They almost always<br />

have at least one of the awful things around, and<br />

most likely will have far more than that. And of<br />

course, because there is a God, and He hates me,<br />

every single fragging Technoshaman having a literal<br />

army of sprites isn’t even the most terrifying<br />

thing about them!<br />

No, the most terrifying thing about Technoshamans<br />

would have to be great form sprites. I<br />

… I don’t know how to describe their capabilities<br />

in the usual sterile manner, so instead I’m going<br />

to tell you a little story. A while back, I was on<br />

a run trying to steal a prototype weapon from<br />

an Ares lab. The complication? There was another<br />

team of runners trying to steal the same<br />

gun. Anyway, I was trying to hack into the lab’s<br />

host, see if I could get their gun turrets to turn<br />

on the lab security. Anyway, in waltzes the Technoshaman,<br />

plain as day, his persona appearing<br />

as this ugly humanoid thing made entirely out<br />

of feathers. Fragger looked out at the army of<br />

Black IC and spoke a few words in a language<br />

that was old when the stars were new. (I didn’t<br />

hear enough to be sure, but I think it might<br />

have been COBOL.) Anyway, whatever it was,<br />

the thing it brought forth … I’ll never forget it.<br />

A giant crow of silicon and fiber-optics, large<br />

enough that, if there were a sun inside the <strong>Matrix</strong>,<br />

it would have blotted it out. Then, with a<br />

flap of its wing, the ghostdammed thing blew<br />

down the entire host. That’s a Technoshaman.<br />

That’s what they do.<br />

> That’s really poetic. I’m kinda surprised to see something<br />

like that on here at all, especially coming from you.<br />

> Red<br />

> I’m not being poetic. That is literally what happened. It<br />

took the host of a top-secret Ares lab down in the time it<br />

takes someone in meatspace to blink.<br />

> Clockwork<br />


KILL CODE What? Taking down a host is impossible. I’d put money on<br />

it.<br />

> /dev/grrl<br />

> I’m just telling you what I saw. I don’t know how I can<br />

make it any clearer. Sourcerers? Machinists? I can handle<br />

them. Technoshamans? They scare me.<br />

> Clockwork<br />

MACHINISTS<br />

Since I’m fairly certain everyone here needs a<br />

break from the terrifying realization that there<br />

are toasterfuckers out there who can take down<br />

hosts with a wave of their hand, let’s switch to a<br />

happier subject. Machinists! The worst they can<br />

do is kill you. Machinists aren’t as good with complex<br />

forms as Sourcerers, and they can’t summon<br />

sprites the way a Technoshaman can, but what<br />

they can do is hijack your rotodrones and have<br />

them give you a terminal case of lead poisoning.<br />

Their hacking abilities are mild at best, but even<br />

if your devices are secure enough that they can’t<br />

get at your drones, they usually come with several<br />

of their own. Think of them as riggers who<br />

happen to hack on occasion, like if I had an army<br />

of evil twins or something.<br />

Anyway, when fighting them, expect the kind<br />

of threats you’d usually expect from a rigger. You<br />

could be up against anything from weather balloons<br />

with chameleon coating and sniper rifles<br />

to a NeoNET Juggernaut coated with so much armor<br />

that the only ways to defeat it are to go to the<br />

nearest IJN base and see if they’ll let you borrow a<br />

battlecruiser, or to go up a flight of stairs.<br />

> Are you speaking from experience here?<br />

> Rigger X<br />

> Suffice to say it was the worst investment I’ve ever made.<br />

The armor plate alone set me back thousands. Five runs<br />

later and I’m still in the red.<br />

> Clockwork<br />

CYBERADEPTS<br />

To finish this all off, we have what are simultaneously<br />

the most and least terrifying of the various<br />

techno breeds: Cyberadepts. The name’s probably<br />

already given away what it is they do. Somehow,<br />

they manage to deal with cyberware in a<br />

way most technomancers can’t. This might not<br />

seem like a big deal until you see a novacoked-up<br />

Kyle Jones (Order #16164256)<br />

88 DATA STREAMS >>


KILL CODE Shame it leaves such a mess, though. I was picking bits<br />

of cyberskull out of my fender for days after the last time I<br />

did that.<br />

> Rigger X<br />

> There’s professional cleaner services you can get to deal<br />

with that kind of thing, no questions asked. They cost a<br />

mint, but it’s worth every nuyen.<br />

> Clockwork<br />

One thing that should be noted is that unlike<br />

real adepts, they have no issues when it comes to<br />

working their witchcraft with guns. Whereas an<br />

actual adept can’t get a gun made into a weapon<br />

focus because reasons I don’t really understand<br />

(I’m a techie, not a professor of thaumatology), a<br />

cyberadept can and will use guns to do things that<br />

you wouldn’t believe. That guy I mentioned, with<br />

the magic cybereyes? He once ricocheted a bullet<br />

off an exposed nail in a wall to hit an Azzie cultist<br />

in the back without harming the cultist’s hostage. I<br />

saw it and I still have a hard time believing it.<br />

> I mean, I can do that too.<br />

> Kat o’ Nine Tales<br />

> Vids or it didn’t happen.<br />

> Clockwork<br />

NEW TECHNOMANCER<br />

QUALITIES:<br />

RESONANT STREAMS<br />

Aside from being extremely technical in nature,<br />

the Resonance’s constantly shifting nature makes<br />

it unpredictable and very malleable. This flow<br />

must be followed by any technomancer seeking<br />

to manipulate and control the Resonance. Some<br />

technomancers have found that identifying a<br />

path to power helps them to focus their abilities.<br />

These paths are called Streams. For all technomancers,<br />

there are several fundamental rules to<br />

streams that must be followed:<br />

• A technomancer cannot follow two streams<br />

simultaneously.<br />

• Players may amend previously created characters<br />

and retroactively purchase a stream.<br />

• Streams cost 20 Karma to purchase and are<br />

not subject to the double cost of qualities<br />

after creation.<br />

Daemons are a new type of bonus. Like their<br />

name suggests, these are autonomous processes<br />

that the technomancer learns to keep running<br />

always. Mechanically speaking, these are passive<br />

bonuses that affect a specific aspect of the<br />

character, giving them either a new power or an<br />

improvement to an existing power. Every stream<br />

has an associated Daemon, along with other benefits<br />

that help to provide the stream with flavor.<br />

The complex form listed with the stream becomes<br />

available for purchase by technomancers in that<br />

stream, but it is not automatically given to them.<br />

These complex forms are only available to technomancers<br />

in those particular streams.<br />

CYBERADEPTS<br />

One of the effects of the recent changes to the<br />

Resonance and the <strong>Matrix</strong> was the unexpected<br />

advent of what many are calling Cyberadepts.<br />

These are technomancers who have the uncanny<br />

ability to modify the way the Resonance interacts<br />

with cyberware.<br />

BENEFITS<br />

• All complex forms that affect cyberware<br />

are performed with 2 less Fading Value.<br />

• +2 dice pool bonus to Compiling and Decompiling<br />

Tests involving Fault and Companion<br />

sprites.<br />


KILL CODE >


KILL CODE


KILL CODE >


KILL CODE


KILL CODE<br />

IN THE FLOW<br />

There is no possible way to spend a higher portion of<br />

your life online than technomancers, because there<br />

is no percentage higher than one hundred. They<br />

have all the time in the world and a lot of individuality,<br />

so that results in a full range of approaches to interacting<br />

with the <strong>Matrix</strong>. This chapter covers some<br />

of the complex forms, sprites, qualities, and echoes<br />

that make technomancers distinct. Here, then, are<br />

ways for technomancers to show how they have become<br />

true individuals.<br />

COMPLEX FORMS<br />

Complex forms help technomancers make their<br />

mark on the <strong>Matrix</strong>, threading up the right tool at<br />

the right time. Here are a few more tools that, at<br />

some point in time, might be the right one.<br />

ARC FEEDBACK<br />

Target: Icon Duration: S FV: L – 2<br />

Arc Feedback grants the technomancer the ability<br />

to catch some of the energy of a successful attack<br />

against them and send it back toward the attacker.<br />

While a technomancer is sustaining this form,<br />

every time they receive <strong>Matrix</strong> damage—that is to<br />

say, damage remaining after any and all resistance<br />

rolls—they roll Software + Resonance [Level] v. Willpower<br />

+ Firewall of the attacker. If the test succeeds,<br />

the damage the technomancer was not able to resist<br />

is reflected back to the attacker at a ratio of 1 point of<br />

damage for every 2 inflicted on the technomancer.<br />

Net hits on the test increase the damage, and the total<br />

damage must be resisted by the original attacker.<br />

Damage reflected back on the attacker does not reduce<br />

the damage taken by the technomancer.<br />

BOOTLEG PROGRAM<br />

Target: Device Duration: I FV: L – 2<br />

Target a device and make an opposed Software<br />

+ Resonance [Level] vs. Willpower + Firewall test.<br />

On a successful test, the technomancer may copy<br />

the effects of one program currently running on the<br />

device for a number of combat turns equal to the<br />

number of net hits.<br />

This complex form may not copy an agent or a<br />

program the technomancer already knows as a Resonance<br />

[program] echo (p. 258, SR5). A technomancer<br />

may only benefir from one Bootleg Program at a time;<br />

threading a new Bootleg Program complex form cancels<br />

any remaing effects of the previous one.<br />

HOST EMULATOR<br />

Target: Self Duration: P FV: L<br />

Sometimes the target needs to believe that<br />

they’re in a regular host doing typical things when<br />

a runner needs that target to be doing anything but<br />

that. And sometimes a little illusion is all you need<br />

to log a target’s keystrokes or get their banking<br />

PINs. Whatever it is, it’s always better to have a host<br />

emulator in your back pocket, just in case.<br />

When threading the Host Emulator complex<br />

form, a technomancer makes a Software + Resonance<br />

[Level] simple test. They create a host that<br />

looks legitimate, but is not, though the pseudo-host<br />

does appear to have been created through official<br />

channels. This pseudo-host seems functional but<br />

does not store any data and cannot make or run IC.<br />

The technomancer may attempt to make the<br />

pseudo-host appear to be a host that already exists,<br />

if they have at least one mark on that host<br />

when this complex form is threaded. Anyone<br />

entering it may realize it’s not a real host by performing<br />

a <strong>Matrix</strong> Perception test, with a threshold<br />

equal to the number of hits rolled when threading<br />

this complex form.<br />

In the event that someone attempts to hack the<br />

host, treat the pseudo-host’s rating as (2 x number<br />

of hits on the threading test). If the hack is successful,<br />

the hacker gets marks on the technomancer<br />

and sees through the illusion.<br />

Kyle Jones (Order #16164256)<br />

94 IN THE FLOW >>


This complex form may be dismissed by the<br />

technomancer as a Simple Action.<br />

MIRRORED PERSONA<br />

Target: Self Duration: I FV: L – 2<br />

You can create a proxy persona that looks and<br />

acts identical to you in the <strong>Matrix</strong>. To differentiate<br />

between the technomancer and the proxy, opponents<br />

must succeed on a <strong>Matrix</strong> Perception test<br />

with a threshold of the number of hits rolled when<br />

threading this form.<br />

If they fail to notice, opponents target the proxy<br />

with a <strong>Matrix</strong> Action. The player rolls a defense test<br />

as normal. If they succeed, the proxy disappears,<br />

and technomancer character takes no negative effect.<br />

PINCH<br />

Target: Self Duration: S FV: L + 2<br />

When you’re caught in the crossfire, sometimes<br />

the only thing to do is burn down everything<br />

around you.<br />

If a technomancer is sustaining this form when<br />

their <strong>Matrix</strong> condition monitor becomes full or<br />

when they are otherwise forcibly removed from<br />

the <strong>Matrix</strong>, all icons the technomancer has marks<br />

on and all icons that have marks on the technomancer<br />

take <strong>Matrix</strong> damage equal to the level of<br />

the complex form. This damage may be resisted.<br />

If a technomancer is removed by the fade damage<br />

from threading this form, the form fizzles and<br />

returns to the fabric of the Resonance before it can<br />

take effect.<br />

PRIMED CHARGE<br />

Target: Self Duration: I FV: L<br />

When a technomancer harnesses the raw power<br />

of the Resonance, it can make any obstacle that<br />

gets in their way regret its choices.<br />

Make a Software + Resonance [Level] test. The<br />

next <strong>Matrix</strong> action you perform gains a dice pool<br />

bonus equal to the number of hits on this test.<br />

RESONANCE BIND<br />

Target: Persona Duration: S FV: L – 2<br />

Need to slow the opposition down? Snag<br />

them in a Resonance Bind that hinders all actions<br />

in the <strong>Matrix</strong>.<br />

Make a Software + Resonance [Level] v. Intuition<br />

+ Data Processing opposed test. On a successful<br />

attack, each net hit reduces the target’s Initiative<br />

Score by 2. If you sustain the complex form,<br />

the target loses the same amount from their Initiative<br />

Score at the beginning of each combat turn.<br />

A target caught in Resonance Bind may attempt<br />

to break free of the binding by making a<br />

Cybercombat + Logic [Attack/Sleaze] v. the complex<br />

form’s Level x 2 opposed test. Success only<br />

means that they stop future Initiative Score loss;<br />

they do not regain any points of Initiative Score in<br />

the present Combat Turn.<br />

RESONANCE CACHE<br />

Target: IC Duration: I FV: L – 2<br />

The technomancer pushes a single IC into a<br />

stream of Resonance that isolates it, effectively locking<br />

it away. Make a Software + Resonance [Level] v.<br />

Host Rating x 2 opposed test. On a successful test,<br />

the IC is locked in a Resonance fold for a number of<br />

combat turns equal to the complex form’s level.<br />

SEARCH HISTORY<br />

Target: Device Duration: I FV: L – 2<br />

Target a device and make a Software + Resonance<br />

[Level] v. Device Rating x 2 opposed test.<br />

On a successful test, the technomancer has a full<br />

record of the device’s <strong>Matrix</strong> history over a number<br />

of days past equal to the number of net hits.<br />


KILL CODE >


KILL CODE


KILL CODE >


KILL CODE


KILL CODE ><br />

Kyle Jones (Order #16164256)


KILL CODE


KILL CODE >


KILL CODE


KILL CODE >


KILL CODE


KILL CODE<br />

A MILLION<br />

ICONS BLOOM<br />

POSTED BY: DEMONSEED ELITE<br />

Techomancers have one core thing in common.<br />

Beyond that, we have plenty of differences, and<br />

like any such people, we can’t resist the appeal of<br />

associating with those who are different, so long<br />

as their differences are like ours. Here, then, are<br />

some notes about the virtual tribes of the Sixth<br />

World, where technomancers can gather with others<br />

who share their talent and inclinations—and<br />

how to make themselves distinct from the other<br />

people who are sort of like them, but not really.<br />

WHAT IS A<br />

VIRTUAL TRIBE?<br />

When technomancers get together and work<br />

closely for a time, bonds form within the group.<br />

That bond makes it easier to get in touch with<br />

the Resonance, and it can help groups of technomancers<br />

get in touch with Paragons, entities of<br />

the Deep Resonance that can guide them.<br />

Not all tribes are focused on hacking. Many<br />

technomancers were not hackers when they felt<br />

the Resonance for the first time. Most technomancers<br />

eventually do learn to hack, both out of<br />

self-defense, and because hacking is just manipulating<br />

programs, which is easy when you can see<br />

the threads underneath the code.<br />

So, if you go looking for a tribe, you will find<br />

hackers — natch — but you will also find truck drivers,<br />

stuffer-shack counter-jockeys, mid-level managers,<br />

factory workers, and Lone Star beat-cops.<br />

Most of them use their varied backgrounds to help<br />

out their brothers and sisters. One technomancer,<br />

someone I have known for years, works a day job<br />

as a sushi chef in the cafeteria of one of the Japanacorps.<br />

They have never suspected her secret,<br />

mostly because she doesn’t hack while at work.<br />

It must be hard resisting the temptation, but she<br />

apparently manages to keep her work and home<br />

life separate.<br />

> Good advice for runners as well, if you bother having a<br />

day job.<br />

> Bull<br />

Knowing that your landlord, unemployed<br />

neighbor, barista, or hairdresser, could be a<br />

Technomancers who join a virtual tribe (otherwise known as a<br />

“submersion group”) gain some mechanical benefits.<br />

Submersion costs [10 + (new Submersion grade x 3)] are<br />

reduced by 10 percent (rounded down) to reflect the support<br />

of more experienced technomancers guiding and helping the<br />

technomancer who is undergoing submersion.<br />

The tribe counts as a group contact and can often source<br />

equipment or chemicals, the real-world substances that can help<br />

build materials to access the virtual.<br />

The tribe also counts as having a tutor for Resonance skills and<br />

abilities.<br />

Some tribes also have a paragon mentor. Joining a mentored<br />

SUBMERSION GROUPS<br />

tribe gives all the benefits and drawbacks of having that paragon<br />

for as long as the technomancer is a member.<br />

Each virtual tribe may have one or more strictures that it follows<br />

(see p. 110).<br />

Leaving a submersion group voluntarily takes an hour of work<br />

with at least two members. Ejecting a member involuntarily requires<br />

an hour of work from at least half of the remaining members.<br />

Members of a group are bound together by the Resonance;<br />

when connected to the <strong>Matrix</strong>, or in any of the Resonance realms,<br />

technomancers who can see the icon of another member in the<br />

<strong>Matrix</strong> can tell with a <strong>Matrix</strong> Perception test if the member is in<br />

compliance with the group’s strictures.<br />

Kyle Jones (Order #16164256)<br />

106 A MILLION ICONS BLOOM >>


technomancer causes angst for people who already<br />

fear technomancers … we could be literally<br />

anywhere.<br />

We aren’t everywhere.<br />

We are, in fact, hardly anywhere. Whatever created<br />

technomancers never exactly made many of<br />

us, and then we’ve had purges and persecutions.<br />

It’s a wonder there are any of us left, but there do<br />

seem to be a few more every year.<br />

> Sure, “There are hardly any of us.” That’s just what they<br />

want you to think.<br />

> Plan 9<br />

HOW TO GET IN<br />

TOUCH WITH AN<br />

EXISTING TRIBE<br />

Paranoia makes technomancer tribes hard to<br />

find. Technomancers have been chased and persecuted<br />

for years now, and groups who support<br />

technomancers openly have been stomped on<br />

by megacorps, or infiltrated by corporate intel<br />

teams, so that any technomancers a group is in<br />

contact with can be tracked down and disappeared<br />

into research labs.<br />

It’s not so much that tribes have gone to<br />

ground; more that the ones that survived never<br />

left the ground in the first place. This makes it<br />

hard to hook up with new groups, but not impossible.<br />

Some tribes seek out technomancers and<br />

try to give them a hand to survive. If you are really<br />

lucky, when you first emerge and are too n00b<br />

to properly protect yourself, one of these groups<br />

will find you, and you’ll be able to join right off<br />

the bat. New technomancers tend to act in predictable<br />

ways in the Resonance, and if another<br />

technomancer is around, they will notice that<br />

someone is resonant. Deckers might not notice a<br />

new technomancer, assuming it’s some kid with<br />

a cheap deck, but another technomancer will. As<br />

long as the experienced technomancer is not a<br />

heartless sellout, they will at least send a message<br />

around that there is a new technomancer,<br />

and most will hang around for a while to protect<br />

the fledgling until they can fly. It may not last for<br />

long, it’s not like we ain’t got shit to do. It might<br />

even be that a sympathetic virtual tribe doesn’t<br />

get the message, or doesn’t have the resources<br />

to help. Sucks to be the fledgling, but the majority<br />

of technomancers didn’t get help to start with, so<br />

newbies have the same chance that most of us<br />

have had.<br />

> How many have you kept from metaphorically walking<br />

into traffic, Netcat?<br />

> 2XL<br />

> Enough. Some have made me sorry that I did.<br />

> Netcat<br />

If you aren’t one of the lucky ones who got a<br />

tribe in your soy-flakes, you have to go looking.<br />

Finding technomancers is tricky, but not impossible,<br />

and when you find technomancers, there are<br />

pretty good odds that one will be in a tribe. Thing<br />

is, you have to go looking in places on the <strong>Matrix</strong><br />

where you think technomancers might hang<br />

out, which is where everyone else thinks technomancers<br />

hang out, including technomancer hunters.<br />

Those are the worst places to be if you are a<br />

technomancer.<br />

The easiest way to find a tribe is to do your research.<br />

You’re a fragging wizard on the <strong>Matrix</strong>, so<br />

act like it, omae! Information about virtual tribes is<br />

around in posts like this one, deep in the <strong>Matrix</strong>,<br />

hidden in protected message boards. Once you<br />

know about a tribe, you can make a guess about<br />

how to contact it. When you think you’ve found a<br />

host where the tribe you hope to join is hanging<br />

out, the best way to extend a greeting is to send in<br />

a sprite with a message.<br />


KILL CODE It must be nice to have some backup—the closest I have to<br />

a bunch of droogs is you lot.<br />

> Glitch<br />

> It must be nice not to have people hunting you down for<br />

something you can’t control.<br />

> Respec<br />

> Well … any more than runners normally get hunted down.<br />

> Puck<br />

Hey, I get it, you’re flush with Resonance and<br />

enjoying your own power! Why should you join<br />

with those technomancer losers when you could<br />

have a totally rad gang of virtual adepts of your<br />

own to boss around and make a splash? Why not?<br />

I say go for it—virtual tribes come from somewhere,<br />

maybe you’ll make it big.<br />

There isn’t a lot that you have to do to make your<br />

own tribe. You need to get together with some<br />

other technomancers (and maybe free sprites)<br />

and then promise that you’ll watch one another’s<br />

backs. That’s it. If you want to do some funky Resonance<br />

stuff as a group, there are a couple more<br />

Kyle Jones (Order #16164256)<br />

108 A MILLION ICONS BLOOM >>


KILL CODE This just looks like putting together a crew, how hard is<br />

that?<br />

> Marcos<br />

> Easy for you, you’re an experienced gun-runner. It’s a lot<br />

harder for some of us.<br />

> Hannibelle<br />

> There are a few of us who don’t get on that well with other<br />

people. It goes against our grain.<br />

> Cayman<br />


KILL CODE Wait, so there are buckets of rules for people to follow?<br />

What’s the point? Isn’t the <strong>Matrix</strong> all about freedom and<br />

doing whatever the hell you want?<br />

> Tolstoi<br />

> You are free to join the group or not, but like many social<br />

groups, there are rules, and if you break the rules you get<br />

kicked out. That’s true for technomancers as much as for<br />

anarchists like you.<br />

> /dev/grrl<br />

ATTENDANCE<br />

The group meets on a regular basis; each member<br />

must attend at least 75 percent of the scheduled<br />

meetings or they have broken this stricture. No<br />

one likes tribe mates who never come on raids.<br />

CHARITY<br />

GROUP STRICTURES<br />

A virtual tribe can choose rules that each of the members<br />

must adhere to. Breaking a stricture means that the member<br />

is no longer a part of the group until they apologize and make<br />

it up in some way. This can cause a group to dissolve entirely<br />

if there is only one person (or even no people) who have kept<br />

the rules.<br />

A technomancer who breaks one or more group strictures<br />

increases all Fading Values by one for each broken stricture,<br />

for every Resonance action that involves Fading, until the<br />

technomancer earns forgiveness from the rest of the tribe.<br />

The list of strictures in this chapter is not exhaustive; any<br />

clear behavior can become a stricture with approval from the<br />

gamemaster.<br />

The group is focused on white-hat activities. Each<br />

member is expected to contribute time, money,<br />

goods, or expertise to people who need it. The<br />

stricture is held if the technomancer has completed<br />

at least one act of charity in the past month;<br />

otherwise, it’s broken.<br />

CORRECTION<br />

A tribe that chooses this believes that they have a<br />

duty to correct wrong information when they find<br />

it. There is a limit to the amount of correction that<br />

a technomancer can complete in a day, so a technomancer<br />

is not expected to correct every scrap<br />

of information they come across. Where the member<br />

can correct a significant piece of information,<br />

but chooses not to, they violate the stricture.<br />

> I’d be surprised if anyone wrote “Grammer Pedant” into<br />

the rules of their little technomancer group.<br />

> Riot<br />

> That’s “Grammar Pedant” to you.<br />

> /dev/grrl<br />

DEED<br />

The tribe needs something done, usually of significant<br />

size. Every couple of months, the members<br />

are expected to spend anywhere from half<br />

a day to most of a week working on a significant<br />

task for the group. Often this involves hacking<br />

someone big.<br />

DEFENDER<br />

A tribe choosing this stricture believes in protecting<br />

fellow technomancers. These technomancers<br />

are often the ones who answer the call when<br />

someone puts out the word for a flash tribe. A<br />

member who refuses a call for help violates this<br />

stricture. This doesn’t apply to dissonant technomancers<br />

or to technomancers who have a reputation<br />

for betraying their own.<br />

In effect, a technomancer can safely turn<br />

down a request for aid from any technomancer<br />

who has notoriety.<br />

DUES<br />

Some tribes choose to maintain a private host<br />

or some other facility for members, and these<br />

cost money. Members of the tribe are expected<br />

to make a regular contribution. In place of actual<br />

cash, hacking a secure host for the tribe’s exclusive<br />

use will also fulfill the stricture for as long as<br />

the host is available.<br />

Kyle Jones (Order #16164256)<br />

110 A MILLION ICONS BLOOM >>


KILL CODE Look, the names these things have sound like they were<br />

given by the stodgiest bland wage-slave. You can guarantee<br />

they are not given names like this in any technomancer<br />

group. We’ve just grouped them together and removed the<br />

funky names so that we can talk about them.<br />

> Netcat<br />

PARAGONS<br />

IN TRIBES<br />

Paragons (see p. 102) sometimes adopt tribes<br />

for their own inscrutable reasons. Presumably<br />

PARAGON TRIBAL BENEFITS<br />

In addition to the personal paragon benefits listed on p.<br />

103, the paragon reduces noise between members of the tribe.<br />

When connecting to, or using a <strong>Matrix</strong> or Resonance action on<br />

a teammate, the noise penalty for distance is halved, as is the<br />

penalty for being in a spam or static zone.<br />

Adding a paragon is a Resonance action that requires the<br />

entire tribe to be present in one <strong>Matrix</strong> location and takes an<br />

hour for each member of the tribe.<br />

Removing a paragon requires a majority of the tribe to agree,<br />

and at least half the tribe to be present. The technomancers<br />

present don’t necessarily all need to be the ones who agree to<br />

remove the paragon. The action takes one hour, plus one hour<br />

for each member of the tribe who is not present.<br />

A tribe may not have more than one paragon at a time.<br />

Whether and when a paragon decides to abandon a tribe<br />

is a call for the gamemaster. In general, a tribe should have<br />

several warnings and opportunities to reform before a paragon<br />

severs the relationship. Similarly, convincing a paragon who<br />

has left to return will require some sort of solid proof that the<br />

tribe has changed its ways, “We promise to do better next time”<br />

will never cut it.<br />

the paragon gets something out of the arrangement<br />

by helping tribes that have similar goals. For<br />

whatever the reason, it’s possible to ask a paragon<br />

to help the tribe out. Tribes are also occasionally<br />

approached by paragons for a mutually<br />

beneficial relationship. When you belong to a<br />

tribe that has a paragon as a patron, you gain all<br />

the benefits and drawbacks of having the paragon<br />

as a personal friend. If you already have a<br />

paragon that you have a special relationship with,<br />

it doesn’t keep you out of the tribe, but you only<br />

get the benefits from your friend; you don’t get<br />

the benefit of the tribal paragon.<br />

One additional benefit a paragon gives is that<br />

it is easier for tribemates to communicate with<br />

each other. Perhaps the paragon smooths the<br />

way for the signal between its helpers, or maybe<br />

it gently molds the communication style of the<br />

tribe in such a way that it is easier to sync. Either<br />

way, talking with your tribemates becomes just<br />

that little bit easier.<br />

> Are these like mentor spirits for mages? Because they<br />

sound like mentor spirits for mages.<br />

> Frosty<br />


KILL CODE While they may look similar, mages and shamans call<br />

on ancient archetypes and spirits, established and<br />

traditional mentors, beyond the ken of our knowledge.<br />

As far as I can see, paragons just popped up a couple<br />

of years ago, and sometimes look different to different<br />

people. Not at all alike.<br />

> Winterhawk<br />

> Sure, and where did the mentor spirits come from<br />

originally? Your explanation sounds good, but I ain’t<br />

buying it.<br />

> Haze<br />

One issue that sometimes comes up is that<br />

paragons and tribes often have similar but<br />

non-identical goals, and occasionally the paragon<br />

tries to push the tribe down the path it wants,<br />

rather than the path the technomancers thought<br />

they wanted. Luckily, technomancers don’t often<br />

see the paragon as infallible, so they can take or<br />

leave advice, and this reduces the influence of a<br />

paragon. Of course, technomancer tribes themselves<br />

are fairly mercurial, and may well decide<br />

to follow their paragon and amend the goals of<br />

the group. They are also able to part ways with a<br />

paragon on friendly terms.<br />

To make things more complicated, sometimes<br />

paragons push for actions that the tribe doesn’t<br />

want, but afterward it turns out to be what they<br />

needed. Many tribes get it wrong, but most paragons<br />

and tribes find they have common ground,<br />

even after large and loud arguments.<br />

Parting ways with a paragon involves using the<br />

Resonance bond that the group shares to unpick<br />

the agreement with the paragon. This is not a<br />

complicated task, but it can take a while to separate<br />

the threads that connect the paragon to the<br />

tribe. A majority of the tribe must agree to parting<br />

ways with the paragon, and at least half the tribe<br />

need to be together in a single <strong>Matrix</strong> location.<br />

Adding a new paragon is also not difficult. This<br />

requires the entire tribe to be in one place and<br />

meet the paragon. The paragon might require that<br />

the tribe entreat or beg for it to join, or it might see<br />

the arrangement as a simple contract, or even just<br />

as a request to hang out. In any case, it will still<br />

take a while for everyone to make introductions.<br />

If the tribe wants to move on from their old paragon,<br />

and have found another to go to, they must<br />

remove their old one before adding the new one.<br />

Paragons can also ditch tribes that they think<br />

are not holding up their end of the agreement.<br />

Normally there will be a long process where the<br />

paragon complains about the actions of the tribe<br />

before it goes.<br />

It’s also possible to establish contact with a paragon<br />

who has broken off an agreement with the tribe,<br />

but you need to do a lot of belly-crawling to get back<br />

into the good books for something like that.<br />

AI IN TRIBES<br />

> This terrifies me.<br />

> Sounder<br />

They aren’t necessarily a natural fit, but some<br />

technomancers offer a hand to AIs, those other<br />

children of the <strong>Matrix</strong>. Artificial intelligences don’t<br />

get the Resonance benefits of being in a tribe, but<br />

many of them are eager to be a part of a relatively<br />

trustworthy group of people who share time on<br />

the <strong>Matrix</strong>.<br />

In many ways, AIs complement technomancers<br />

well. AIs can do several things that technomancers<br />

can’t, especially the way they can interact with devices<br />

using their depth. The technomancers bring<br />

the ability to access the Resonance realms and<br />

sprites, things that AIs can barely understand, let<br />

alone attempt.<br />

In any case, depending on how much the AI<br />

and the tribe trust each other, the home host of an<br />

AI can be an ideal place for a tribe to meet. If the<br />

AI isn’t quite that trusting, their ability to manipulate<br />

ownership of devices is still an excellent way<br />

to get a safer and more secure home for the tribe<br />

and can cut down on the <strong>Matrix</strong> profile of many of<br />

their members.<br />

AIs also often seem to be interested in sprites<br />

as a curiosity, and some even attempt to study<br />

them in order to find out whether an AI is a distant<br />

cousin of a sprite, or whether they are different<br />

constructs entirely. Little progress has been made.<br />

Sprites don’t seem to mind the attention, but most<br />

do not have any interest in studying the other way.<br />

AIs can be very effective advisors as well, but<br />

like anyone (other tribe members included) they<br />

have their own goals, and care must be taken that<br />

the tribe doesn’t become a pawn in some larger<br />

power play that the AI is involved in.<br />

Naive AIs also have a history of abuse, and<br />

some of those doing the abusing have been technomancer<br />

tribes. When someone easily led and<br />

eager to help is in your group, there are many<br />

Kyle Jones (Order #16164256)<br />

112 A MILLION ICONS BLOOM >>


KILL CODE I’m still terrified.<br />

> Sounder<br />

VIRTUAL TRIBES<br />

AS CONTACTS<br />

Sometimes you might have made a friend of a<br />

technomancer, and he might introduce you to his<br />

friends. Virtual tribes are not very trusting, but if<br />

you help out the whole tribe, you can get a group<br />

of friends you can rely on. Having a whole tribe<br />

as a friend is not as reliable as having one individual<br />

person, since the people you helped out may<br />

not be the ones who pick up the phone. Even so,<br />

it is nice to know a group of incredible hackers. If<br />

you continue to help them out with small tasks—<br />

normally things that cannot be done from the<br />

<strong>Matrix</strong>—they will be able to help you out in the<br />

<strong>Matrix</strong>.<br />

Virtual tribes excel at being an information<br />

clearing house—they are better as a group than<br />

any individual hacker is. If you are friends with a<br />

group, they will be happy to share juicy gossip<br />

with you. Specific paydata—such as the building<br />

layout for the Aztec pyramid, or the name of the<br />

lead scientist on the Evo jump-pack project—will<br />

cost you, but you can expect mates-rates. Generally,<br />

they will have already built in their best discount,<br />

so negotiating probably won’t work, and<br />

you might even offend your friends by being hardnosed<br />

on money.<br />

Virtual tribes collect information about their<br />

central cause, but are also good sources of information<br />

about the <strong>Matrix</strong> generally, about movers<br />

and shakers in the area, about BTLs and skillsofts.<br />

Tribes are also uniquely good at examining very<br />

large amounts of bland information and coming<br />

up with patterns and root causes. So if you ask<br />

them to look at arrest records, public shipping<br />

manifests, and disease statistics, they may come<br />

back and say that two DocWagon crews are smuggling<br />

medical supplies to three particular gangs on<br />

the edge of the Redmond barrens, just from looking<br />

at all the information and picking out patterns.<br />

FAVORS THAT VIRTUAL<br />

TRIBES APPRECIATE<br />

Virtual tribes don’t have access to everything. When looking<br />

to help a tribe out, there are a variety of things that you can do<br />

that would make things easier for them. The small selection<br />

below should be taken as a starting point.<br />

1. Looking up information in a paper-based library<br />

2. Repairing broken drones<br />

3. Social engineering passwords<br />

4. Being the muscle in a show of intimidation<br />

5. Letting someone hide out at your place<br />

6. Looking after the body of someone on a Resonance quest<br />

> I’ve worked for worse. Normal rules apply—don’t trust the<br />

Johnson if it’s more valuable for them to screw you over.<br />

> Bull<br />

> They don’t sound like they would know what they are<br />

doing, which is not good. The bullets I’ve taken are usually<br />

because I’ve worked for green Mr. Johnsons who didn’t<br />

know what they were doing.<br />

> 2XL<br />

> Yeah, they are a mixed bag, but no one is going to be as<br />

on top of it as an experienced corporate Johnson. Unless<br />

you’re working for a mega, Mr. Johnson is going to need<br />

some hand-holding. That applies to these tribes<br />

> Bull<br />

SAMPLE TRIBES<br />

REPLANTING THE TREE<br />

Talk about your secretive groups—the virtual tribe<br />

referred to as “Replanting the Tree” goes to extreme<br />

lengths to stay secret, hidden even from<br />

other technomancers. I don’t know who their<br />

leader is, and I think that they actually meet in<br />

meatspace to advance whatever shadowy goals<br />

they have. The group has been around a long<br />

time, and it doesn’t look like they are taking many<br />

signups. I possess some facts and rumors, and<br />

they clearly are up to something. Other technomancers<br />

have encountered mysterious and hostile<br />

Replanters in the Deep Resonance realms,<br />

apparently looking for something or trying to<br />

build something. Members thought to have been<br />

with the tribe seem focused on Seattle, especially<br />


KILL CODE Wait, they want to “Replant the Tree”? That will not stand.<br />

> Axis Mundi<br />

> There is a big difference between wanting to and being<br />

able to.<br />

> The Smiling Bandit<br />

> What are you old bastards talking about?<br />

> Turbo Bunny<br />

> I’ll send you some archived files.<br />

> The Smiling Bandit<br />

SUMMER_KNIGHTS<br />

It’s a hard world, and some people want to do<br />

their best for the people they know, protecting<br />

them against the horrors beyond their little gate.<br />

Even non-technomancers. Hey, deep in the Resonance<br />

there could be all kinds of crap that people<br />

don’t know about. Also, technomancers, like<br />

shadowrunners, see a lot of drek that doesn’t<br />

make it to the newscasts. A hell of a lot of the<br />

time it’s not profitable for a corporation to protect<br />

people, so sometimes technomancers have<br />

to be the unsung heroes of the wilderness. As<br />

you can imagine, protecting non-technomancers<br />

is not a very common viewpoint, but the Summer_Knights,<br />

led by ALT-Halus, go out and do<br />

just that.<br />

The Summer_Knights are mostly made up of<br />

people who never thought they would become<br />

technomancers, and the group as a whole is more<br />

about ears on the street than deep-diving into the<br />

Resonance. As a result, they tend to make a difference<br />

on a local level. They can pick up when<br />

someone is being attacked in the <strong>Matrix</strong> and assist,<br />

but they can also coordinate people around<br />

the world to make small gestures that mean a lot<br />

to people. When paperwork gets lost in the bow-<br />

Kyle Jones (Order #16164256)<br />

114 A MILLION ICONS BLOOM >>


KILL CODE So, they like to do good things, but really little good<br />

things?<br />

> Winterhawk<br />

> Yeah, they are pretty low-key, haven’t heard much about<br />

them, but maybe that’s the way to stay alive? Ooooooor<br />

maaaybe they are subtly building up a large subnet of<br />

favors and influence at all levels of society, so that when<br />

they make their big play, everyone who owes them will<br />

keep it secret. Maybe they have already done it! I need to<br />

check a few things …<br />

> Snopes<br />

TECHNORIGGERS<br />

The <strong>Matrix</strong> is made up of all kinds of devices. Vehicles<br />

and drones have had riggers since the <strong>Matrix</strong><br />

1.0 and will probably have riggers for many<br />

years to come. As we are a part of this milieu of<br />

devices, servers, nodes and drones, some of us<br />

naturally gravitate toward vehicles as well. There<br />

is a lot to be said for abandoning the flesh but still<br />

remaining a part of the physical world. The Virtual<br />

Racers want to support and encourage technomancers<br />

to embrace the physical world in shells<br />

of metal and plastic. The Virtual Racers seem to<br />

have lost one of their influential members lately,<br />

and there are crazy, spontaneous drone races<br />

happening all across the world, which look like<br />

they could be a shaking down of the pecking order.<br />

It’ll settle down soon as someone, or someones,<br />

step up to lead the group, but for now it’s<br />

fun to watch cleaning drones down their mops<br />

and skip along wet soapy corridors. My favorites<br />

SUMMER_KNIGHTS<br />

Estimated Membership: 12<br />

Headquarters: Cleveland, UCAS<br />

Membership Requirements: A stricter-than-normal evaluation<br />

period, during which members of the group will observe<br />

the potential recruit for months to evaluate whether they<br />

suit the group.<br />

Strictures: Attendance, Oath, Defender<br />

Customs: Deed, Secrecy<br />

Resources: Medium<br />

Dues: Medium<br />

Patron: Alt-Halus<br />

Paragon: None<br />

Membership Benefits: The good feeling that you get for<br />

supporting a group that makes a change in the lives of a<br />

tiny number of people.<br />

Dominant Stream: Technoshamans<br />

Roles for Non-Technomancers: None<br />

Contact Benefits: Alerting the group to areas that they can<br />

help in will earn a small reward. Actively helping the group<br />

with tasks will result in loyal friends.<br />

TECHNORIGGERS<br />

Estimated Membership: 40–60<br />

Headquarters: Austin, Texas<br />

Membership Requirements: No formal requirements<br />

Strictures: Deed (Have a great race!)<br />

Customs: Gossip<br />

Resources: Medium<br />

Dues: Medium<br />

Patron: None<br />

Paragon: None<br />

Membership Benefits: A good source for rigging-based<br />

submersion techniques, they also have good contacts for<br />

buying and trading drones.<br />

Dominant Stream: Cyberadepts<br />

Roles for Non-Technomancers: Group is open only to<br />

technomancers. Normal riggers have their own clubs for<br />

this sort of thing, although there are more and more nontechnomancer<br />

fans around. AIs are welcome and can race<br />

the technomancers, but not in ladder races.<br />

Contact Benefits: Buying and selling drone hardware, and<br />

other vehicle-style benefits. Also, if you want to be taken<br />

on the ride of your life, you can ask them to take over your<br />

Ford Americar. Just be sure to have good insurance.<br />


KILL CODE That can’t be it. There are more groups than this around.<br />

> \dev\grrl<br />

> This is a sample to let you know what sort of things are<br />

out there. Groups are forming and dissolving all the<br />

time. Contact me off-board if you’re looking to make<br />

connections.<br />

> Demonseed Elite<br />

FLASH TRIBES<br />

Most of the time you hang out in your hacker<br />

pod, or dive apartment, cruising the <strong>Matrix</strong> alone<br />

and living by your wits, but sometimes you come<br />

across something that needs doing. Yeah, sometimes<br />

that’s “for the greater good,” but more often<br />

it’s taking down some bastard who needs taking<br />

down, or hacking some corp that is lazy about<br />

Kyle Jones (Order #16164256)<br />

116 A MILLION ICONS BLOOM >>


KILL CODE You know, I’ve been around one of these things when it’s<br />

all gone sideways. There was digital graffiti everywhere,<br />

avatars suddenly flipped between basic shop-bought<br />

ones and random creations from a costume shop.<br />

No one could do anything, and the rigger who was<br />

with me lost control of all of his drones. We killed the<br />

technomancer who set it off—it was pretty easy to spot<br />

the panicking person with no deck or ware. I think we<br />

did them a favor. Of course, that didn’t stop the ones<br />

who had turned up to party.<br />

> Red Anya<br />

IGNITING A FLASH<br />

There are two aspects to using flash tribes: calling the<br />

technomancers and guiding them. In many ways it’s not unlike<br />

calling a sprite with dozens of heads.<br />

Putting the word out can determine how many<br />

technomancers turn up, and it’s not like you get to turn people<br />

away, so there might be people there that you don’t expect.<br />

To determine how many people join a flash tribe, roll the<br />

number of dice determined by the table below and add up the<br />

total (rather than counting the number of hits).<br />

DETERMINING FLASH TRIBE NUMBERS<br />

CALLER<br />

MODIFIER<br />

Caller has a charisma of 5+ +1D6<br />

Caller has submerged +1D6<br />

Caller is a part of an existing tribe +1D6<br />

Caller gives more than ten minutes<br />

warning<br />

+1D6<br />

Caller gives less than a minute warning –2D6<br />

Caller has participated in a flash tribe in<br />

the past month<br />

+1D6<br />

After the people turn up, the caller has to maintain control<br />

of the tribe. This is Charisma + Leadership (number of dice<br />

rolled). If this roll is successful, the tribe adds teamwork dice<br />

to each Resonance test made by the caller and anyone else<br />

who is designated by the caller.<br />

If the roll fails, the technomancers run amok. This is an<br />

opportunity for roleplaying out a chaotic scenario. However, in<br />

the interest of keeping things simple, this can be modelled by<br />

adding noise equal to the number of technomancers who have<br />

turned up to everyone in the area.<br />


KILL CODE<br />

DIVING<br />

UNDER<br />

POSTED BY: RESPEC, BUT<br />

DEFINITELY NOT WRITTEN BY HER<br />

> Okay, so, I found this on the ‘link of someone who came<br />

after me. Defused a heck of a data bomb to get it. It looks<br />

like some sort of “protect yourself from technomancers”<br />

guide. Thought it might be good to help us understand<br />

how people think we might come at them, so we can<br />

respond appropriately. Also, we can have a few laughs.<br />

> Respec<br />

> Who would write something like this? Someone who has<br />

it in for technomancers?<br />

> Soldat<br />

> Could be someone with an axe to grind, Clockwork?<br />

> Netcat<br />

> Sh’yeah right. If I ever wrote something like this, I’d never<br />

admit it. Or share it with you people.<br />

> Clockwork<br />

HUNTING<br />

TECHNOMANCERS<br />

That title means two things. In one meaning, the<br />

first word is a verb, the second is an object. In<br />

the other, the first word is an adjective describing<br />

what the second word is doing.<br />

In either case, you have the challenge of avoiding<br />

someone who swims in the information currents<br />

of the <strong>Matrix</strong> like they are born in them.<br />

Because they were. They have a sense for the ever-present<br />

data flow that can help them either find<br />

what they are looking for quickly or disappear in<br />

the ocean of noise.<br />

What this means is that whatever sense of the<br />

term is being used, it’s trouble. If you’re dealing<br />

with technos, you need to know some of their<br />

habits and tendencies so you can close on them<br />

or get away from them, as situations require. Here<br />

are some tips that should help.<br />

NOTICING THAT<br />

YOU’RE BEING HUNTED<br />

It’s funny, this is the third time today that you’ve received<br />

a call from a telemarketer who knows your<br />

name, and how much money you have in your<br />

primary account. For a few weeks, pizza delivery<br />

drones have been delivering your food to the<br />

Humanis Policlub meetings down the block, and<br />

every time you login, you have to reset your icon<br />

to the default, because something keeps moving<br />

your virtual head to where your virtual ass is.<br />

If you see things like this, you may have a problem.<br />

You may have pissed off a hacker. No need to<br />

panic, though, since a typical decker can only get<br />

you when you’re online. Oh, your offline soy-oven<br />

is spitting out garlic-flavored orange juice? Your<br />

’link keeps setting its timezone to Tanzania? Yeah,<br />

you might have annoyed a technomancer. Think<br />

back—what have you done on recent runs? Have<br />

you let your enemies identify you?<br />

If you someday figure out that there’s a technomancer<br />

who has it in for you, you’re going to have<br />

a bunch of problems that you wouldn’t have with<br />

other enemies. One thing that a technomancer<br />

has in common with a decker is that they could be<br />

sitting pretty in Europort while mucking with your<br />

stuff in south Jersey City. You’ve got a couple of<br />

lines of attack. Firstly, if you, yourself, are a decker<br />

or a technomancer, then you can hit them the<br />

same way they hit you. You can hunt them down<br />

in the <strong>Matrix</strong>, maybe through old-fashioned legwork,<br />

maybe by looking at their meFeed, or whatever<br />

you come up with. Then you can ambush<br />

their icon and smack them till they cry. Of course,<br />

the fact that you’ve made an enemy of them and<br />

haven’t eliminated them already might mean that<br />

they are a better hacker than you, in which case<br />

Kyle Jones (Order #16164256)<br />

118 DIVING UNDER >>


TRACKING DOWN<br />

AN ENEMY TECHNOMANCER<br />

A technomancer enemy is, naturally. most likely to be<br />

encountered in the <strong>Matrix</strong>. If you want to prepare your<br />

defense or ready a counterattack, it first helps to know<br />

where your adversary might be. For this, there is the Trace<br />

Icon <strong>Matrix</strong> action, p. 243, SR5, repeated here for your<br />

convenience.<br />

hunting them down in the <strong>Matrix</strong> will probably<br />

be like a chihuahua attacking a doberman. Don’t<br />

abandon everything <strong>Matrix</strong>, though—there are still<br />

good leads that you can track down and information<br />

that you can glean. It’s just that this may not<br />

be the time to go in with virtual guns blazing.<br />

Unless you have an army.<br />

Let’s be honest, you probably can’t afford a<br />

hacker army, but it would be a very effective way<br />

of tracking down and killing an enemy hacker. You<br />

might also consider bringing in a technomancer of<br />

your very own. Ain’t nothing better at destroying<br />

sprites and technomancers than another one, it’s<br />

not like there is a big sisterhood or brotherhood of<br />

these bastards. You’ll probably be able to find and<br />

hire one that is willing to fight another, so spend<br />

some of that cash stockpile, work out which grid<br />

they hang their hat in, and go in with friends—as<br />

many as you can afford.<br />

A better idea than going after them in the <strong>Matrix</strong><br />

is to attack their weak, fleshy meat. Technomancers<br />

spend a lot of time in the <strong>Matrix</strong>, and<br />

while they are not necessarily weaklings, they will<br />

go down in a broken bleeding heap to someone<br />

who keeps themselves in peak physical condition.<br />

It’s often not even that hard to find out where they<br />

live, if you have the right contacts. Anyone who<br />

is skilled enough to come after you probably has<br />

a reputation, and if they have a reputation, you<br />

can use that to track them down. The hard bit is<br />

actually getting to (say) Singapore without them<br />

noticing and either hoofing it or preparing some<br />

sort of nasty surprise for you while you’re in the<br />

air. Remember that this person has it in for you,<br />

so they will probably notice if your name crops up<br />

on an international flight path. They might even<br />

notice if you get a taxi to a nearby bus station.<br />

Best bet is to spend the extra nuyen and buy the<br />

services of a coyote to get you to where you’re<br />

going. You can remain under the radar by being<br />

extra careful. Disguise your face so that cameras<br />

TRACE ICON<br />

(Complex Action)<br />

Marks Required: 2<br />

Test: Computer + Intuition [Data Processing] v. Willpower<br />

+ Sleaze<br />

You find the physical location of a device or persona<br />

in the <strong>Matrix</strong>. After succeeding with this action, you know<br />

the target’s location for as long as you have at least one<br />

mark on the target. This doesn’t work on hosts because<br />

they generally have no physical location, or IC programs<br />

because they are confined to their hosts.<br />

If you are unable to gain two marks on the target, you<br />

will have to use good old-fashioned legwork. Remember to<br />

use appropriate modifiers to any rolls made; for instance,<br />

the Distinctive Style quality adds +2 dice to tracking down<br />

the person who has it.<br />

have a harder time recognizing you, put a stone<br />

in your shoe to give yourself a limp, travel on your<br />

feet, or buy a bicycle or something, and while you<br />

are going to need a commlink of some sort, get<br />

yourself a new one. Seriously, leave your main<br />

’link at home (or with a friend, so it still looks like<br />

it’s moving about), and buy a cheap model without<br />

a camera when you get there to talk to your<br />

friends back home. Then ask around for someone<br />

who matches the description of your bogey, buy<br />

a few big guns (in case they have drones), turn off<br />

your wifi, and go kick down a door and pop some<br />

grenades.<br />

I hesitate to mention it, but if you don’t want to<br />

go to all that trouble, you could go for a non-violent<br />

solution. If you know who the technomancer<br />

is, you might be able to get a friend to talk to them<br />

and pressure them into backing off. One good<br />

way to do that is by making friends with someone<br />

close to them, or bribing someone close to them,<br />

and then seeing what it would take to back off. To<br />

be fair, if you really have fucked them over, you<br />

might have to try to undo whatever it was that<br />

honked them off. Whether this is worth your time<br />

and money is a decision that you’ll have to make,<br />


KILL CODE >


KILL CODE


KILL CODE >


KILL CODE


KILL CODE<br />

INFINITE<br />

REALMS<br />

POSTED BY: NETCAT<br />

We’ve detailed some parts of the Resonance<br />

realms before, but one of the tricks to a place that<br />

seems to be infinite, or at least as close enough<br />

that it might as well be inside out, is that there are<br />

perpetually new places to explore. I’ll run down<br />

some of the places I’ve encountered or heard<br />

about lately. Dive in!<br />

TOMBSTONES<br />

One of the Resonance realms I’ve been to recently<br />

that I have no real desire to revisit is a place<br />

called Tombstones. It seems like every program<br />

that has run in the past but is no longer supported,<br />

is obsolete, or has been replaced by something<br />

superior has come to rest here. The realm<br />

looks like endless rolling black hills under a starless<br />

black sky, where black and white tombstones<br />

contain the last output that these dead programs<br />

ever produced. The size and ornamentation of<br />

the tombstones seem to be related to how popular<br />

or widespread the program was. Some hills<br />

have hundreds of tiny plaques celebrating “Hello<br />

World” programs, where other hills may have<br />

just one large, forbidding sepulture to a piece of<br />

accounting software that was once used across<br />

the world but has now faded into history. Near<br />

the edges of the realm are graves where the programs<br />

they are attempting to contain are not<br />

quite dead. Error messages and other failures<br />

slowly update on the headstones, slowing down<br />

as the last few machines running these dying programs<br />

stutter and fall silent.<br />

Despite the fact that these programs have displayed<br />

their final output, there is still valuable information<br />

locked away behind obsolete interfaces<br />

and dead terminals. For the technomancer willing<br />

to put in the work, it’s possible to find all kinds of<br />

embarrassing or revealing information with a little<br />

bit of digital necromancy. In the Sixth World,<br />

where creative accounting history is almost a field<br />

unto itself, there are many financial trails that are<br />

digitally massaged so that they look innocent. Often<br />

old records can reveal the beginnings of data<br />

trails that can lead to criminal convictions, loss of<br />

employment, or a large dip in share values. This<br />

realm is a popular spot for technomancers who<br />

are looking for historic data, who are feeling nostalgic,<br />

or who are looking for a particular program<br />

they may have used or coded in their youth.<br />

The sprites who haunt this realm often seem to<br />

take on familiar human shapes. Often they appear<br />

to take their appearance from people who died<br />

in the various <strong>Matrix</strong> crashes, or who were the<br />

subject of virtual personality experiments. Small<br />

in numbers, a heartbreaking group of sprites appear<br />

to be modeled on technomancers who have<br />

died in corporate experimentation. None of these<br />

sprites seem interested in talking about any former<br />

lives they might have had; they only seem interested<br />

in keeping weeds off the burial sites.<br />

There are a few technomancers who come to<br />

try to find friends or family who have died in <strong>Matrix</strong>-related<br />

experiments, with some success. The<br />

sprites don’t seem to mind having people come<br />

and watch them, although it can be tragic when<br />

a technomancer prefers sitting and watching the<br />

e-ghost of a dead lover. Sometimes people become<br />

so absorbed watching their loved ones that<br />

they neglect their own body. Perhaps there are<br />

family groups of e-ghosts wandering the black<br />

hills.<br />

That whole thing creeps me out. It puts the consequences<br />

of anti-technomancer bias in my face,<br />

and their mournfulness feels like failure to actually<br />

live. It offers emotions I have no desire to feel.<br />

> As with so much of the realms, the problem here is the<br />

ratio of available data to useful data. For every financial<br />

program buried here, there are like a thousand endless<br />

runner games. And for every set of numbers that reveals<br />

Kyle Jones (Order #16164256)<br />

124 INFINITE REALMS >>


some past shenanigans, there are ten thousand sets of<br />

numbers that offer no useful information whatsoever. If<br />

you have no tips on where to find something useful, you’ll<br />

start to see how finding a needle in a haystack can feel like<br />

a comparatively easy task.<br />

> Icarus<br />

KERNEL PANIC<br />

It can be pretty mind-bending being a technomancer<br />

sometimes—using your brain to interact<br />

with the <strong>Matrix</strong> goes against everything that<br />

metahumanity has been trying to do for as long<br />

as we’ve been around. Twisting your brain around<br />

the metaphors and underlying structure of the<br />

Resonance is something we grow into, one piece<br />

at a time. Every time we gain another piece of<br />

insight, we grasp something that can help us understand<br />

things at a deeper level.<br />

That doesn’t seem possible with the realm that<br />

has been called Kernel Panic. My friends and I<br />

have a theory that Kernel Panic is raw, unfiltered<br />

Resonance, unshaped by anything—simple and<br />

honest. In any case, visiting Kernel Panic is a confusing<br />

experience. At first, there doesn’t appear<br />

to be any sculpting for the realm—colors, scents,<br />

and sounds combine in a bright welter of sensory<br />

information. If you can stand to stay for a while, a<br />

kind of order in the randomness emerges. Patterns<br />

shift and reverberate through different timescales.<br />

One moment you can see what looks like a sprite<br />

being assembled or born; another moment there<br />

is a series of discordant rising tones and the strong<br />

smell of vanilla drifting by while part of the fundamental<br />

essence of a complex form drifts past.<br />

At this point, many technomancers drop out of<br />

the experience, overloaded and overwhelmed. I<br />

know that the first time that I visited I needed a<br />

bit of me-time, so I stayed in the meat world for a<br />

while. The funny thing is that the weird sensations<br />

and patterns stuck with me for a while. I couldn’t<br />

stop thinking about them, and when I had worked<br />

through them it felt as if I’d solved a complicated<br />

equation while sifting through my own emotions.<br />

At that point, I noticed that the Resonance seemed<br />

easier to use, flowing with more clarity around me.<br />

Technomancers who are looking for more information<br />

about themselves and the Resonance<br />

may find that Kernel Panic helps them. I’ve heard<br />

of a lot of people who haven’t got anything from<br />

the experience, but then I’ve never heard of anyone<br />

who has gone dissonant because they visited<br />

the realm. It’s a popular destination for technomancers<br />

wanting to submerge.<br />

> I went and had some similar experiences to Netcat the first<br />

time. I loved it, and I decided I would go back regularly,<br />

treating it as a sort of meditative spot. It was great the first<br />

few times, but I noticed the calming effect started steadily<br />

declining. I don’t know if I was building up a resistance<br />

or something, or if I was just getting used to the weird<br />

patterns. I found myself wanting to find a way to get that<br />

initial sensation back, and that feeling tends to make me<br />

nervous. So I went cold turkey.<br />

> Hexatite<br />

> Probably just means you need to work harder to maintain<br />

your focus. Or the realm is working to drag you under its<br />

control. One or the other.<br />

> Puck<br />

THE FACTORY<br />

Each time a technomancer visits the Factory,<br />

they enter a side access door into a huge building.<br />

Looking across the Factory floor, you see<br />

sprites assembling other sprites out of Resonance.<br />

Huge crucibles of molten data swing high<br />

above, dripping and splattering hot raw Resonance<br />

around the feet of anyone in the vicinity.<br />

As you progress through the building, giant robots<br />

are created alongside tiny creatures, and all<br />

of them are transported off into a hazy orange<br />


KILL CODE As far as you know.<br />

> Puck<br />

On the other hand, who knows where sprites<br />

might go when they’ve been made? One thing is<br />

clear about this place—if you are looking for information<br />

about compiling or registering sprites, this<br />

realm has a lot of useful data. It tends to be a bit on<br />

the clinical side, which might well represent how<br />

metahumanity is learning about technomancers,<br />

sprites, and the Resonance.<br />

You can get some information by observing the<br />

construction processes, but more useful is finding<br />

and talking with a floor supervisor. Skilled and resonant<br />

technomancers even get to talk to the Factory<br />

Foreman. The supervisors are a little work-focused,<br />

but they’re usually willing to talk and can<br />

provide interesting insights into just how things<br />

are being assembled. The Foreman always carries<br />

an air of harried work overload, and it can be tough<br />

to pin him down for a conversation of any length.<br />

Flash a little Resonance-shaping skill, though, and<br />

he’ll be more likely to slow his pace and have a few<br />

words. It’s not at all clear who the Foreman reports<br />

to, or if there is even anyone who is higher up the<br />

food chain. In any case, having skilled sprites walk<br />

a technomancer through the processes they use<br />

teaches a lot about how to interact and deal with<br />

those beings.<br />

Sprites are everywhere in this realm, as are<br />

construction hazards and fast-moving delivery vehicles.<br />

Health and safety are treated seriously, but<br />

it’s not like technomancers and sprites are hurt by<br />

the same kinds of things. There is very little malice<br />

here, but accidents do happen. Watch your step.<br />

> A rookie mistake is keeping your eye only on the raw<br />

materials, thinking the danger comes from spilled molten<br />

metal or something, while ignoring the finished sprites.<br />

The sprites here, though, exist in varieties I have never<br />

encountered, and some are feral and quite mean. You<br />

might stroll by a sprite under construction that decides to<br />

take a bite out of you the moment it gets finished. Danger<br />

can come from anywhere.<br />

> Respec<br />

CRUFT: MISC. FLOTSAM<br />

FROM SOCIETIES<br />

Some of the Deep Resonance realms are harder<br />

to describe than others. Where most realms have<br />

a door or some sort of portal to open, in order<br />

to enter Cruft, you must push through a clinging,<br />

sticky matted mass of fibers. Once you make it<br />

through the first bunch, each step you take in the<br />

realm involves wading through deep masses of<br />

cotton-wool material, which clings and sticks.<br />

Pick up these fibers, and you can see all kinds of<br />

memes, viral images, and videos sliding along the<br />

fabric. Repetitive musical earworms gently tinkle<br />

through the air, as if being played somewhere<br />

far distant. The longer you stay in the realm, the<br />

more alone and isolated you feel, but picking up<br />

and watching the pictures and videos can ease<br />

the loneliness for a while. I find it hard to stay focused<br />

here—if I didn’t have shit to do, I could see<br />

myself wasting hours and hours watching various<br />

rodents or geometric repeating patterns. Different<br />

parts of the realm seem to be dedicated to<br />

different types of material, where one section<br />

might be mostly pictures of politicians crossed<br />

with animals, another might play repeating tunes,<br />

and yet another might show variations on the<br />

simsense three-emotion reel.<br />

There are not a lot of reasons to visit this realm<br />

for serious work, but there are a few useful pieces<br />

of information buried in the masses of cute animals.<br />

If you’re looking for something catchy to distract a<br />

group of people, you could do worse than to find<br />

a fitting meme buried in the Cruft. Probably more<br />

useful is the fact that it’s possible to get a gauge<br />

on how groups of people are feeling based on the<br />

material passing through this realm. If you want an<br />

idea of who might be getting a groundswell of support<br />

during an election, or if you need to work out<br />

what might be most damaging to a corporation,<br />

it’s possible to get inspiration here. Some technomancers<br />

also come here to numb the pain of ex-<br />

Kyle Jones (Order #16164256)<br />

126 INFINITE REALMS >>


KILL CODE As with most of the Resonance realms, the trick here is<br />

that there is a mass of data, and you have to figure out<br />

what it means. Yes, you’ll see pictures and videos, and<br />

you’ll get the sense of what some people are thinking<br />

about—but which people does the thread you’re<br />

looking at represent? There can be clues in the strands<br />

of fabric you’ll encounter, but these clues can be tricky.<br />

Is that tartan plaid you’re holding representative of<br />

some group of Scots, or executives who make Scotch<br />

tape? Does the dragon-scale pattern you see represent<br />

a particular dragon? The Draco Foundation? Saeder-<br />

Krupp? If you want to use the information you find, a<br />

guess is not good enough.<br />

> Netcat<br />

OUT OF BAND<br />

In the cracks between the other Resonance realms<br />

lies the raw networking that links the realms together.<br />

Not so much a realm itself, Out of Band is<br />

a pathway for moving between different realms.<br />

As you squeeze yourself into the realm, you feel<br />

yourself pulled at high speed through tunnels<br />

made of light. Most of the time this will last for a<br />

few tenths of a second before you arrive at your<br />

destination. Technomancers often feel that this<br />

is just the process to get to the other end, but if<br />

you are prepared for it and ready to hold on, it’s<br />

possible to keep yourself in the stream and stick<br />

in the pipe. On the edge of the information flow,<br />

shapes, sounds, and other sensations flow past. If<br />

you reach out, millions of independent fragments<br />

of information flow through and around you, creating<br />

a confusing torrent of raw data.<br />

Out of Band makes a good place to meet other<br />

technomancers, sprites, and other denizens of the<br />

Resonance, and technomancers who spend any<br />

reasonable amount of time in this realm generally<br />

find it easier to connect to the Resonance. It’s certainly<br />

easier to communicate with paragons here.<br />

Unlike many other Resonance realms, Out of<br />

Band doesn’t store information—it’s a conduit, not<br />

a repository, but some information from meatspace<br />

seems to travel through Out of Band to get<br />

to the other realms. I haven’t heard of anyone who<br />


KILL CODE Ready to go down a rabbit hole? The theory is that the<br />

Resonance realms records every bit of <strong>Matrix</strong> data, ever.<br />

And what happens in the Resonance realms counts. That<br />

includes Out of Band. So if someone changed a document<br />

while here, the original document and the changed<br />

document would be saved somewhere. So you could find<br />

both. Good luck with that—and determining which is the<br />

original and which is changed.<br />

> Hexatite<br />

HUMAN MALICE<br />

(DISSONANT REALM)<br />

Where many technomancers visit Resonance<br />

realms in order to learn more about what goes<br />

on there, or to create strange and unusual code,<br />

there are other realms that do not have those<br />

kinds of positive effects. These other realms<br />

swirl, not with chaos (well, not just with chaos),<br />

but with malevolent and dire information that<br />

can harm any data and personas that tread unwisely.<br />

Sensible technomancers don’t visit these<br />

places, but if you are very quick and careful, you<br />

might survive long enough to get out, and maybe<br />

cut the cord for a while to recover. Many people<br />

who visit these realms descend into madness<br />

and Dissonance, so these places are called Dissonant<br />

realms. We’re still not sure if the Resonance<br />

is one big ball of information with Resonant and<br />

Dissonant parts, or whether those two sources<br />

are related but ultimately separate. Or if they are<br />

something entirely else.<br />

One realm that a friend has reported on doesn’t<br />

really have a name, but I’ve taken to calling it the<br />

realm of Human Malice. If the Endless Archive is<br />

where every bit of information is stored carefully<br />

for the future, Human Malice is a hot, sweaty<br />

shack of revenge porn, doxxing information, online<br />

blackmail material and so on. Human Malice<br />

probably repeats some of the same information<br />

that the Endless Archive has, but where the Endless<br />

Archive has secrets carefully nested away under<br />

glass, Human Malice has insults, angry texts,<br />

heated invective, and video footage that people<br />

wished did not exist. Information on explosives<br />

and chemicals plaster the walls. The denizens of<br />

this realm look like twisted caricatures of humans.<br />

Distorted, sweaty sprites dressed almost exclusively<br />

in deteriorating rubber and split leather. No<br />

two of them are alike. It’s hard to know what the<br />

beings of this realm do, as no sane individual has<br />

stayed long enough to find out, but it’s unlikely to<br />

be good. There may be a paragon nestled deep in<br />

Human Malice, but I wouldn’t want to see it.<br />

REVERSING<br />

THE CURRENT<br />

POSTED BY: PUCK<br />

Let me tell you a story.<br />

Once there was a young man who lived in a<br />

kingdom that was broken. There were dozens<br />

of mud huts surrounding a grand castle, and of<br />

course the mud dwellers were never allowed into<br />

the castle. Scents of wonderful food sometimes<br />

drifted out of the castle’s window, and occasionally<br />

a carriage with plush velvet seats, pulled by<br />

horses as tall as two men, moved to and from the<br />

castle. The mud dwellers had a hint of the grandeur<br />

that was close by, but it was something they<br />

could never touch.<br />

The man, understandably, became bitter at<br />

this whole situation, and he decided to storm the<br />

castle and get some of the riches it held. First, he<br />

vowed to climb the wall, but he was met at the top<br />

by guards who rudely threw him to the ground.<br />

Then, he decided to tunnel under, only to find the<br />

foundation went deeper into the ground than he<br />

can imagine. Then, he decided to rob one of the<br />

carriages. And he actually succeeded, stealing<br />

away a small bag of coins and enough food for a<br />

full meal, which he shared with his family. It was<br />

the best meal they had ever eaten.<br />

The next day, guards from the castle emerged,<br />

found the man and his family, and killed the entire<br />

family. The man, they left alive.<br />

After that, his only goal was to burn the castle<br />

down.<br />

Is that man me? It has been, sometimes. Not all<br />

the time. I’ll bet it’s been a lot of you, too. I mean,<br />

isn’t that what we’re doing here? Seeing how<br />

much damage we can inflict on the fortress the<br />

Kyle Jones (Order #16164256)<br />

128 INFINITE REALMS >>


KILL CODE I’d be somewhat creeped out by this and objecting to<br />

Puck’s presence on this board if I didn’t have a part of me<br />

that totally understood what he is saying.<br />

> Mihoshi Oni<br />

And so we have Dissonant technomancers. In<br />

some ways, they’re like toxic shamans, who have<br />

given themselves over to the forces that would<br />

tear apart the world and have thrown their souls<br />

into channeling dark destruction. In other ways,<br />

they’re not like anything, because we do not have<br />

the words for all the things they do. Or to describe<br />

the tools they use.<br />

We know they channel Dissonance, but what<br />

does that mean? We’re still figuring out what<br />

Resonance is, and Dissonance is even less clear.<br />

Is it the anti-matter to Resonance’s matter? Is it<br />

a somewhat different wavelength of Resonance,<br />

where sometimes it can amplify Resonance,<br />

sometimes it can flatten it in destructive interference,<br />

depending on how and where it hits? Is it<br />

another force entirely that just happens to be able<br />

to interact with Resonance? I don’t know. I don’t<br />

even know what the Resonance is. I just learned<br />

how to use it.<br />

And some people are learning how to use Dissonance.<br />

I don’t believe I can talk about Dissonance<br />

streams the same way I can about Resonance<br />

streams. The Resonance is wild, but it also has …<br />

well, “flavors” doesn’t seem like quite the right<br />

word, but it’s also not entirely wrong. The streams<br />

are discernible.<br />

Maybe the streams in the Dissonance are discernible,<br />

too. I’m not willing to stare at them long<br />

enough to find out. What I have seen, though, is<br />

how people use the Dissonance. I’ve seen what<br />

they do, and to me and a number of other TMs I’ve<br />

talked to, there seem to be certain patterns. These<br />

aren’t tribes or anything—these are just ways of<br />

describing tendencies we’ve seen out there and<br />

putting people into groups based on this behavior.<br />

MORPHINAE<br />

This name came from an insect-loving friend of<br />

mine. She named these people after a lovely group<br />

of butterflies that are usually dark blue, black, and<br />

purple in color. Some of them flit from flower to<br />

flower; others fly higher than tree tops. She liked<br />

this name because it fits some technomancers<br />

who treat Dissonance like a toy, something to bat<br />

around and see where it goes. They have not fully<br />

submerged themselves in the Dissonance, but<br />

they don’t have their feet planted on the ground.<br />

It’s not clear where, or if, they will land.<br />

The biggest danger with the Morphinae is they<br />

are experimenting with something neither they,<br />

nor anyone else, fully understands. When they try<br />

to weave a complex form or summon a sprite out<br />

of Dissonance, they are not sure what will happen.<br />

And if they did something once that got a good,<br />

controllable reaction from the Dissonance—or at<br />

least something that they could dismiss before it<br />

turned on them—they make sure to never do that<br />

again. Control isn’t interesting to them. They always<br />

seek something different, something new,<br />

and, if things go their way, something disruptive.<br />

It’s the online nightclub where the dance floor<br />

starts undulating, then slowly slides up the wall,<br />

taking you with it. It’s the concert that turns into a<br />

dream—you’re in your underwear, you’re talking to<br />

people you can’t remember encountering, you’re<br />

here then you’re there without knowing how you<br />

got from one point to another. But it’s only odd if<br />

you stop and think about it. It’s the distant howl of<br />

an animal you never see, but you smell its musk.<br />

The noise continues for so long that you wonder<br />

how the creature ever breathes, but then you remember<br />

that of course it doesn’t have to. Its howl<br />

ebbs and flows, it rises so it pierces into your skull<br />

and bounces around, hitting a note that feels like<br />

it might melt your eyeballs. You try to shake it. But<br />

it won’t go away.<br />

I don’t know if you’ll ever experience those<br />

things, or things like those things. I don’t know<br />

what the Morphinae will unleash if you come near<br />

them. I just know that you won’t predict it.<br />

> These people are not the most powerful enemy you’ll<br />

ever encounter, but they rank among the most annoying,<br />

simply because they’re entirely unpredictable and<br />

impossible to reason with or anticipate. Any of the normal<br />

motives that might apply to someone—money, sex, selfpreservation,<br />

even basic curiosity—may or may not apply<br />

to them. They don’t employ tactics, you don’t have what<br />

they want, and you have no idea what they’ll unleash at<br />

you. Seriously, annoying as hell.<br />

> Pistons<br />


KILL CODE Wait, “sapient consciousness”? Is Puck saying this sort of<br />

thinking occurs in AIs?<br />

> Sounder<br />

> It does. Perhaps not as universally as it does among<br />

metahumans, but sapience comes with a certain need for<br />

intuitive creativity, and intuitive creativity comes with the<br />

chance of making connections that do not, in fact, exist.<br />

> Icarus<br />

Apophenians channel the Dissonance to make<br />

connections between points and elements on the<br />

<strong>Matrix</strong> that did not exist before their involvement.<br />

There is a decent possibility that these connections<br />

shouldn’t exist. But for better or worse, the<br />

Apophenians make them happen.<br />

This can be many things to people in our line<br />

of work—a blessing, a curse, a nuisance, or something<br />

else. For example, say you’re looking to get<br />

some paydata from a walled-off private host, and<br />

you find out some Apophenian had built a direct<br />

connection from, like, Dante’s Inferno. If that connection<br />

occurs before you break in—great, you just<br />

found an easy way to get somewhere that would<br />

otherwise take significant time and effort. But if<br />

they make the connection after you break in, your<br />

secretive operation is now interrupted by club goers<br />

looking for a secluded spot. You don’t want<br />

that to happen.<br />

> One of their more casual hobbies is to create infinite<br />

loops, where two locations are changed to refer only<br />

to each other, leaving anyone logged on there stuck.<br />

Yeah, you can log off, but sometimes they’ll try to close<br />

down those channels so you have to risk dumpshock.<br />

They’re charming.<br />

> Pistons<br />

That’s one of the more direct examples of their<br />

work. Many people are concerned that they are<br />

building other connections that are hidden and<br />

will not reveal themselves until the Apophenians<br />

have done enough to foment a catastrophe. Will<br />

they make a Crash 3.0-scale event? Unlikely. There<br />

is too much redundancy in the <strong>Matrix</strong>, too much<br />

monitoring by GOD for that to happen from a<br />

small group of actors planting slow-moving seeds.<br />

Will they cause bad craziness to erupt inside some<br />

hosts? You bet your ass.<br />

> One likely intended effect: Dissonance pools in<br />

unexpected places.<br />

> Netcat<br />

> And since this is Dissonance we’re talking about here,<br />

don’t be quick to dismiss them with a thought like, “well,<br />

at least they couldn’t connect X to Y, because <strong>Matrix</strong><br />

structures blah blah blah.” Dealing in Dissonance opens<br />

up possibilities most of us would rather not contemplate.<br />

> Hexatite<br />

ERISIANS<br />

This third “group” has been named after the Greek<br />

goddess of strife and discord, because honestly<br />

that’s as descriptive a name as you could get. They<br />

are the nihilists of the <strong>Matrix</strong>, prepared to burn<br />

the existing structure down and see what emerges<br />

from its wreckage. They are united in their worship<br />

of something none of them understand. That<br />

seems to be part of the worship—channeling Dissonance,<br />

letting it bloom (hmm, seems like the wrong<br />

word. Maybe “fester”?), seeing what it makes, what<br />

it destroys, and what it becomes. They stare at it,<br />

enraptured, the way an arsonist watches flames.<br />

They believe in Dissonance, but that belief can not<br />

be translated into any kind of identifiable system of<br />

values. Do they believe the Dissonance will build<br />

Kyle Jones (Order #16164256)<br />

130 INFINITE REALMS >>


KILL CODE You sound oddly condemnatory, given your past. I would<br />

think you’d be able to find some sympathy.<br />

> Nephrine<br />

> I figured that argument would come up. I know I made<br />

mistakes (though my assessment of what those are may<br />

not be in sync with what others think), but one thing<br />

I have never lacked is a sense of purpose. I have had<br />

an idea of what I want to happen, even when I have<br />

chosen the wrong means. The Erisians don’t have that<br />

understanding, at least not as far as they have been able<br />

to communicate to me.<br />

> Puck<br />

Some of you still might be inclined to seek Erisians<br />

out, for whatever reason. Since my encounters<br />

with them have been limited, I sought out others<br />

who had met them so they could share their<br />

impressions of what it was like to meet them. Here<br />

is a selection of their responses, with no identifying<br />

information because I have no desire to cause<br />

trouble for any of these people:<br />

I was in the Louvre host, just taking in some<br />

paintings, when the paint started liquifying, dripping<br />

down the canvas and off the frames. I turned<br />

and saw some people panicking, while others were<br />

frozen in place. Then they started to melt, too. I<br />

didn’t know if they had been there the whole time.<br />

I hadn’t been looking at them. I couldn’t say which<br />

of the people around me were real. Then the walls<br />

started melting, revealing what was behind them.<br />

What was behind them were spirals, twisting and<br />

turning, pulling people in. They made a noise like a<br />

metal saw. It felt like my teeth were disintegrating,<br />

even though my sim modules are nowhere near<br />

that sensitive. One of the spirals reached for me,<br />

and the whining became louder, and the disintegration<br />

moved into my skull, and I felt my head<br />

falling apart.<br />

When I woke up, I was offline. Ten hours had<br />

passed. I gotta get some neurological tests done.<br />

Files move here, files move there, just a normal<br />

day keeping the data and numbers flowing.<br />

On days like that—which is every day—anything<br />

different is welcome, so when I saw the first<br />

firework go off, I smiled. Then there were a few<br />

more, in red and orange and yellow. They were<br />

bright but soundless. Then more came, and they<br />

were bigger, and then each one—how can I say<br />

this?—shot out its own kind of reality. You could<br />

see each ember expand, and you could see a window<br />

into some other place in their growing circle.<br />

Some showed crowded cities, others vast deserts,<br />

others twisted alien landscapes. When people<br />

were hit by them, they disappeared. I didn’t know<br />

what happened to them. But then I got hit by one.<br />

Suddenly, I was standing on a cliff near a sunny<br />

beach. There were a few people strolling around,<br />

dipping their toes in the water, enjoying themselves.<br />

I had no idea where I was, but it turned<br />

out to be a pretty normal Horizon grid. I logged<br />

off and went on with my life. Our company grid<br />

was down for two entire days, and when it came<br />

back and I returned to work, three of my coworkers<br />

were gone. No one has said what happened<br />

to them.<br />


KILL CODE Puck seems to be a little obtuse on this one. Don’t we know<br />

one of the main purposes of people like the Erisians—to<br />

spread Dissonance?<br />

> Cosmo<br />

> One on level, maybe. On another level, maybe not.<br />

Part of the problem is that we know so little about<br />

what Dissonance is. Does it get stronger as it is more<br />

concentrated? Or is it best when it is spread out, so it<br />

can touch as much non-Dissonance as possible? Does<br />

Dissonance want to dominate the world, or just corrupt<br />

enough of it so that it acts as a spiced contrast to the<br />

order of the rest of the world. Or does neither the<br />

Dissonance nor its followers know anything about what<br />

they want, but they act out of some instinct or intuition<br />

whose roots are foreign to our ways of thinking? These<br />

questions helped prevent Puck from speaking with any<br />

certainty.<br />

> Pistons<br />

GAME<br />

INFORMATION<br />

NEW TECHNOMANCER<br />

QUALITIES: DISSONANT<br />

STREAMS<br />

What is the nature of data? To a resonant technomancer,<br />

data flows in specific patterns, and like<br />

electricity it seeks the path of least resistance.<br />

There is order in the world, and data seeks to<br />

obey. Dissonant technomancers deal with another<br />

flow, whose nature and rules are not clear, but<br />

it has a destructive, chaotic effect on Resonance.<br />

Dissonant technomancers do not seek to control<br />

this force so much as unleash it. The rules and science<br />

behind Dissonance are not really interesting<br />

to them. They treasure the experience, and they<br />

place that above things such as efficiency, logic,<br />

or morality. Is there any wonder that the allure of<br />

Dissonance is so strong?<br />

These streams follow the same rules as Resonant<br />

streams (p. 89), in that a stream costs 20 Karma<br />

to purchase and does not double its cost after<br />

character creation. A character cannot follow two<br />

streams simultaneously.<br />

MORPHINAE<br />

Like the butterflies from which they take their<br />

name, Morphinae flit to whatever catches their<br />

attention, and the direction of their gaze is not always<br />

clear. They are <strong>Matrix</strong> mad scientists, trying<br />

new things to see what happens without any regard<br />

for the consequences. Dissonance is a brave<br />

new world to the Morphinae, and because they<br />

have detached themselves from their mental<br />

blocks to accept their new reality, they are wild<br />

and unpredictable.<br />

Kyle Jones (Order #16164256)<br />

132 INFINITE REALMS >>


KILL CODE


KILL CODE >


KILL CODE


KILL CODE<br />

NULL<br />

SIGNS<br />

POSTED BY: DOUBLE A<br />

> Well, that was interesting. For anyone who missed it,<br />

the file I uploaded disappeared only 8.3 seconds after<br />

I completed the upload. I tried again, and it made it<br />

7.4 seconds before it disappeared from the system.<br />

Not just deleted—all records of the attempt gone. For<br />

anyone who managed a copy (and kept it) or is a real<br />

speed-reader, feel free to use the Null Sect post for<br />

commentary. I encrypted the title phrase, hoping that<br />

will keep Them at bay! I recommend avoiding names and<br />

specifics, since whoever They are, They have remarkable<br />

search software. Maybe we can have a conversation<br />

before They erase the data. I’m also going to send out a<br />

physical copy (I know, ewww) to a few people and keep<br />

tossing uploaded scans every few days, as long as it<br />

doesn’t get dangerous. If you’ve already got a copy, pass<br />

it on. They’ve focused on deleting the files up until now,<br />

as long as that’s where they put their focus, we’ll keep<br />

trying to free the information.<br />

As for the scan, well, it’s complicated. I got this sent<br />

to me from a courier I trust, and he said the guy on<br />

the other end was a frazzled mess who looked like he<br />

hadn’t slept in weeks. I read it, vetted a few things, and<br />

then tossed it up. And we saw what happened. Nothing<br />

like having a file deleted by some mysterious force to<br />

let you know you’re onto something. For all those who<br />

have a copy, I’m sorry about the state of his mind, his<br />

English, and his typing skills. It looks like he used some<br />

kind of offline typing system that doesn’t bother to<br />

correct typos and he wasn’t in any state of mind to go<br />

back and edit. So, with no further ado, I’ll toss it up one<br />

more time for dreks and funnies. Let’s see if they can<br />

get it in under five. This’ll all go up in a burst, then you<br />

can comment after.<br />

> Glitch<br />

> From the opening snippet I managed, this looks like what<br />

I was talking about. This guy got more, and probably<br />

lost more, but this has to be the same strangeness I was<br />

talking about in the Dark Terrors drop.<br />

> Puck<br />

> Pick up your postal order and you can read it all—he left<br />

me a side note that he sent you a copy.<br />

> Glitch<br />

> I’m a few thousand miles from that registered address.<br />

When I get back in the area, I’ll pick it up. Until then I’ll limit<br />

my nightmares to what I already know, and avoid adding<br />

any more looking over my shoulder.<br />

> Puck<br />

THE NULL SECT<br />

My name is Allan Ames. My street name is Double<br />

A. I worked primarily in the St. Louis sprawl<br />

until 2076; since then, I’ve been all over the world.<br />

I’m a decker, though I also possess a small connection<br />

to the Resonance. It stays small because<br />

of the interference created by my augmentations.<br />

Tetris took me in and tried to make me better, but<br />

I never managed to manipulate much. He’s dead<br />

now. The first casualty who pointed me down this<br />

path. I’m at the end now. Not much more I can<br />

do. I’ve interfered too many times. They didn’t<br />

care that much at first. But once They feel you are<br />

a threat, it’s a downhill path, usually starting with<br />

the erasure of your identity. Let me finish this intro<br />

bit. I worked with the Arch Villains for awhile<br />

until I became a liability. They’re a good crew despite<br />

the asinine name.<br />

As for this document, what I’m doing here is<br />

an attempt to work around Their normal protocols,<br />

outside Their sphere of influence. I apologize<br />

in advance for any errors. I’m a skilled typist,<br />

but it’s been a long time since I clicked away<br />

on something so archaic as this typing machine.<br />

I think it’s actually called a typewriter, but I’m not<br />

sure. I’ll type this, make some copies, send them<br />

where I think they’ll do the most good, and keep<br />

going, but I think this may be the straw that breaks<br />

the dot-camel’s back. I tell you all these things in<br />

Kyle Jones (Order #16164256)<br />

136 NULL SIGNS >>


case you may need to seek me out or may need to<br />

continue my investigation and wish to look for my<br />

original work. It’s there. Just dig.<br />

For others who have traveled a similar path, or<br />

those who I have talked to and discussed this topic<br />

and whom this concerns, or even those within<br />

this <strong>Matrix</strong> pit who are willing to listen to reason,<br />

I write this to tell you something has changed. For<br />

years this issue only concerned us technomancers<br />

and the AIs out there. They left the regular users<br />

alone, They left them to their standard user agreements<br />

and didn’t worry about device users, but<br />

technomancers, and even a few AIs, have friends.<br />

Friends who are willing to help, despite it not being<br />

their problem or their fight. But 2079 has seen<br />

changes to Their behavior. Too many regular users<br />

are interfering with Them. Too many rumors are<br />

spreading about Them. Now, They seem to have<br />

widened their scope of desires. They no longer<br />

just threaten the technomancers, AIs, and Monads<br />

(really just meatsuit AIs). They’ve expanded Their<br />

efforts. Maybe this was always the plan. Maybe we<br />

pushed too hard like we always do. Neither matters.<br />

Now, we just need to know what’s out there,<br />

and that’s where these pieces of paper are going<br />

to come in handy.<br />

Pulling the curtain back feels good, even if I am<br />

exposing myself to a metaphorical firing squad.<br />

Read on.<br />

Fight on.<br />

Hack the Planet.<br />

Defend our virtual realm.<br />

WHAT DO<br />

WE CALL THEM<br />

I call them the Null Sect, thanks to Puck’s little<br />

blurb elsewhere on JackPoint, and because nothing<br />

is available on them. They don’t have a formal<br />

name for themselves, just an agenda. This is<br />

one of the first things that astonishes me about<br />

them. They have no name, yet they can find data<br />

on themselves and their efforts with very little<br />

difficulty. While we use keywords and phrases<br />

to guide our searches, they use something else<br />

that detects patterns and conversations at a rate<br />

beyond even the fastest search programs on the<br />

highest-end systems out there. If the name Null<br />

Sect is sticking, it will just make it even easier for<br />

them to find data on them, but I don’t know any<br />

other way to communicate. We name things. It’s<br />

what we do. They don’t, it’s an easy early divide<br />

to identify our ways of thinking. Point is, that’s<br />

the name, but don’t expect naming to help this.<br />

Probably just makes it worse, but I need a reference<br />

point for myself. From here on, assume that<br />

“They, Them, Their” all refer to the Null Sect with<br />

those intentional capitalizations. And feel free to<br />

cut off this piece of the page if it helps keep this<br />

posted for more than a few minutes.<br />

WHAT DO THEY WANT<br />

A world free of us. And by us, I mean everyone.<br />

But, not like we all need to die, but like we all need<br />

to leave their world and stay out for good. This is<br />

where understanding some fundamental differences<br />

might be necessary. They exist in only one<br />

place—the <strong>Matrix</strong>. From the Foundation to the<br />

smallest host and across every Grid, they consider<br />

the <strong>Matrix</strong> to be theirs, and they want us out of<br />

it. It’s more than just wanting us to not be in the<br />

<strong>Matrix</strong>, they want what I refer to as a “meat free<br />

matrix.” This is a <strong>Matrix</strong> without personas, without<br />

technomancers, without deckers, without people<br />

on commlinks, without emerged technocritters,<br />

without any connection to the physical world.<br />

They even want a <strong>Matrix</strong> not reliant on the power<br />

provided by physical sources. Not steam, not<br />

sunlight, not tides, not geothermal energy. They<br />

want nothing from the physical world. They want<br />

people to no longer project their consciousnesses<br />


KILL CODE >


KILL CODE


KILL CODE >


KILL CODE


KILL CODE >


KILL CODE


KILL CODE >


KILL CODE


KILL CODE >


KILL CODE


KILL CODE >


KILL CODE


KILL CODE >


KILL CODE


KILL CODE >


KILL CODE I’ll put this right here at the top. Yes, I noticed there are<br />

several places where Double A didn’t capitalize as he<br />

intended, but we are all relatively intelligent and can<br />

read context clues, so stop spamming this log with<br />

corrections. The man typed this up on a damn typewriter.<br />

Dig one of those out of the trash heap, slam out a doc<br />

this large without any errors and you can then come here<br />

and comment. Thank you all for your understanding. And<br />

honestly, if I had my way, I’d go back and get rid of every<br />

capital, because it’s an easy search parameter to utilize.<br />

> Glitch<br />

> I’ve heard a lot of rumors from <strong>Matrix</strong> sleuths about<br />

their access accounts getting erased. One day they have<br />

access, the next, their account is erased and their getting<br />

an error message every time they try to log on. Given the<br />

work they do, and efforts they make to “free the data,” it’s<br />

very well possible they are being targeted by this group.<br />

> Slamm-0!<br />

> A technomancer I know—well, they used to be a<br />

technomancer—woke up in a recovery ward at a street<br />

doc with a body full of cyber. Most of the systems were<br />

secondhand and the doc mainly served as a chop shop<br />

for the local Yaks, but someone dropped off my buddy,<br />

transferred the doc a sizable sum, and ordered a full<br />

cybersuite installed. Needless to say, the techno lost<br />

his connection to the Resonance. He flipped his drek<br />

and started digging (that’s how I got involved) and we<br />

managed nada, zip, zero, null progress. Could have been<br />

something else, but it seems an interesting way to get a<br />

technomancer off the <strong>Matrix</strong>.<br />

> Butch<br />

> Why not just hire a hitman? A bullet to the brain deals<br />

with technomancers, too. The effort and funds to snatch,<br />

deliver, and then get a doc to install all that drek. Too much<br />

work for the reward.<br />

> Clockwork<br />

> Let’s look at this for arguments sake. The nuyen is nothing.<br />

Nuyen is code. They control code. He said many times that<br />

they don’t think like we do. They don’t think of life and<br />

death in the same way. They think on and off the <strong>Matrix</strong><br />

as life and death. Maybe, they have experienced enough<br />

e-ghosts, or the like, to think killing a technomancer just<br />

risks creating an e-ghost. Better to simply cut off their<br />

access.<br />

> Glitch<br />

> The <strong>Matrix</strong> without power? That sounds like a<br />

technomancer fantasy flick I caught last year. Post<br />

apocalyptic drivel that had technos ruling a world after<br />

it was sent back to the dark ages by an asteroid impact<br />

or something. Then along came a techno with different<br />

thinking and changed everyone’s mind, overthrew the<br />

powers, and the world went on happily ever after. The<br />

problem was, they never explained how a <strong>Matrix</strong> existed<br />

without devices.<br />

> /dev/grrl<br />

> Maybe the technos were the devices in the trid. Doesn’t<br />

match up with what he says they’re doing to technos here,<br />

since they’d be corralling them to run their <strong>Matrix</strong> on, but<br />

then again, that’s not meatless—that’s meat based.<br />

> Slamm-0!<br />

> Those Red Spread things sound more like a bunch of<br />

individuals all working together rather than a single entity.<br />

Especially if they can do all that drek at once. Based on<br />

what he says, I don’t think any of these things are limited<br />

by the normal rules we’ve put on the <strong>Matrix</strong> about size<br />

and function. It sounds like they take whatever shape they<br />

fragging feel like.<br />

> Bull<br />


KILL CODE I think I’ve seen a Clear-Out. That outline they form looks<br />

like it’s made of old magnetic tape, like the stuff in old reelto-reels<br />

or cassettes. I’m not entirely sure, could have just<br />

been a really tweaked persona. When I got a good look,<br />

they were hanging out in a Lone Star host and could have<br />

jacked out to disappear so fast, but I could have sworn I<br />

saw something move away. Most people I tell this story to<br />

have told me I’m nuts, but now it makes sense.<br />

> Turbo Bunny<br />

> Reports about something like the Nulls pop up often<br />

on the local forums and chat spots. I can’t find a single<br />

one up right now, but I know I’ve seen them before. I<br />

was positive about one over on the WizTechTime site,<br />

but now it says it was taken down by the moderator for<br />

content. I know for a fact the mod didn’t take anything<br />

down, because I’m the moderator.<br />

> Slamm-0!<br />

> That makes sense. WizTechTime is garbage!<br />

> Glitch<br />

> I’ll fess up to my utter hatred of technos, but I’m not some<br />

secret tool of a <strong>Matrix</strong> cult. I don’t care if you fragsacks<br />

believe me, but I’m saying straight up, I am not a part of<br />

this (deleted by sysop). If I happen to have taken a job to<br />

rid the world of a fraggin’ techno and it was contracted by<br />

them, oh well. I do that all the time. As for anything Double<br />

A may have tried to send me. I’ll never get it because I<br />

never stick around anyplace long enough for <strong>Matrix</strong><br />

trackers to nail me down, so some snail mail letter has<br />

an ice cube’s chance in hell of catching up to me. Maybe<br />

I’ll look into jobs I take, maybe I won’t, but anything that<br />

helps me rid the world of you freaks, I’ll be sure to offer<br />

special low-rates for my services.<br />

> Clockwork<br />

> I deleted dozens of lines insulting Clockwork. Stop wasting<br />

my memory stores. Keep it on point here. I also snipped<br />

the name of “Them”, as Double A puts it. Don’t drop it in<br />

here or we’re likely to lose this forum along with the data<br />

when it pops up.<br />

> Glitch<br />

> I’ve heard of Tam before. He’s like the bogeyman for<br />

technomancers. Far worse than even Clockwork. That<br />

headware treatment his doc performs has been the death<br />

sentence for dozens of TMs that would rather end their lives<br />

than live without the <strong>Matrix</strong>. The upside is that most don’t set<br />

off their cortex bombs and they get found during the autopsy.<br />

Though that is also the bad news because post-mort docs all<br />

over have been injured when they went to check the cranial<br />

cavity. Tam, or at least his MO, is connected to investigations<br />

in most corps and nations all over the world.<br />

> Stone<br />

> Nice thing about corporate police running cities is the<br />

connectivity between systems. If we could get the big<br />

boys (KE, Lone Star, Minuteman, etc.) to play nice together<br />

it would be even better, but that’s a pipe dream.<br />

> <strong>Kill</strong>joy<br />

> That would be a nightmare, not a pipe dream. They’d<br />

have most runners pinned in a few days. The only thing<br />

keeping them off us would be their corporate masters<br />

who would then just blackmail us into working for them.<br />

Don’t lose that positive attitude, kid, but maybe leave<br />

some naïveté behind.<br />

> Bull<br />

> Drek! Seagull! I heard nothing but positive things. She’s<br />

got a solid rep and a great list of contacts. Though, I guess<br />

one of those is a piece of drek, but everything I’ve heard of<br />

her has been solid chill.<br />

> KC<br />

> The Hitsec protocol was vicious. It buried targets in IC,<br />

launching program after program in a cascade of death. It<br />

focused heavily on every derivation of black IC available,<br />

operating on the concept that a brain-fried target has no<br />

chance of becoming a repeat offender against the system.<br />

> Netcat<br />

> Transys-Neuronet is rocketing up in several areas now that<br />

Celedyr isn’t flooding money into his pet project. With the<br />

fate of Eliohann within Boston still unknown, the efforts<br />

to wake him from his coma have been at least somewhat<br />

successful, Celedyr’s funding is moving to more lucrative<br />

projects and getting T-N back on the big-money track it was<br />

on before Celedyr became obsessed with fixing his kin.<br />

> Traveler Jones<br />

> I walked from a job in London involving a deep hack into<br />

T-N systems. The job was supposed to be a data insert with<br />

some other edits, but I didn’t think the cash was enough<br />

for that kind of trouble. Celedyr and company have solid<br />

e-security backed up by those Knights of Rage nutbags.<br />

Could have been O’Ryan trying to get her background<br />

changed so she could move over.<br />

> Respec<br />

> Celedyr’s still paying some attention to business in the<br />

newly reopened NEMAQZ. The wyrm has been putting<br />

cash into intel ops and runs in the area trying to get an idea<br />

of what happened to Eliohann. If it weren’t for the fact that<br />

the folks up near Salem, where he supposedly resides,<br />

are complete wackjobs, he may have figured something<br />

out by now, but they take their privacy seriously. Which<br />

means they’re probably hiding something.<br />

> Ire<br />

Kyle Jones (Order #16164256)<br />

154 NULL SIGNS >>


KILL CODE Either a crazy dragon or a dead dragon. Neither one is<br />

going to get them the kind of attention they want.<br />

> Slamm-0!<br />

> Or a perfectly sane dragon who now has a very quiet<br />

place to live and a very dedicated group of followers to<br />

worship him. Eliohann was never about ruling the world.<br />

> Ire<br />

> The Lost Children have expanded to the Seattle and PWV<br />

Metroplexes. The Seattle cell had a serious recruitment<br />

push not too long ago and may be larger than the normal<br />

four-person size, or they have more than one cell. The<br />

ones in PWV seem focused on disrupting Evo’s efforts in<br />

the city, including their relationship with other Monads<br />

who stayed back.<br />

> Plan 10<br />

> I know the decker who set up the host for Hoodville.<br />

Goes by the handle of 3D, and he’s been buddying up<br />

with hackers with serious assault talent over the past few<br />

months. He may be looking to put together a force to try<br />

to clear out his host. I don’t know if that is even possible,<br />

but he’s the type to share the info on whether or not it<br />

works after the fact. Though if he doesn’t say anything, it<br />

probably failed and he’s a dead troll.<br />

> Slamm-0!<br />

> 3D has also been looking for talent willing to go offworld<br />

as well. Seems he has an interest in Gagarin. He’s<br />

not alone in this. Several corps have started looking<br />

for shadowrunners willing to be spacerunners in order<br />

to gain access to any intel the Monads may have left<br />

behind. Evo has the jump, since they still had an in, but<br />

they lost tons of personnel, leaving the place ripe for the<br />

picking.<br />

> Fianchetto<br />

> Z-O, and therefore the Corporate Court, has a solution.<br />

Great. Yet another thing they can lord over us to keep us<br />

down.<br />

> Balladeer<br />

> The Blazing Parrot is well known in that region as the<br />

spot to collect bounties on technocritters. Not sure if that<br />

means collusion with these things, but it’s definitely a<br />

similar area of interest.<br />

> Picador<br />

> PWV transit hub? Is that the one that was rumored to have<br />

been run by an AI? That’s why they got so efficient, so fast.<br />

Now, the question to ask is if that AI is still there, or if it got<br />

decoded when the host was seeded.<br />

> Traveler Jones<br />

> Anyone else find it strange that he named places this was<br />

sent? If THEY get ahold of a copy, which they obviously<br />

have because it’s getting deleted from here, then they<br />

know where else to look.<br />

> Ecotope<br />

> I read it as something for us. Something to let us know<br />

there are others out there who share this burden. We<br />

know that if we lose our copy, there are others who have<br />

it as a backup.<br />

> Netcat<br />

> Or it’s a list of targets for someone to hit and clear out<br />

every hardcopy he’s sent.<br />

> Thorn<br />

> There are more copies out there than he has mentioned. I<br />

already made sure of that.<br />

> Glitch<br />

> Way to paint the target.<br />

> Hard Exit<br />

> “Do not live in fear of the darkness. Shine a light on it and<br />

you will see there is nothing to fear.” —FastJack<br />

> Glitch<br />

> Drek! That’s what they’re doing. Chummers have been<br />

getting brainfried left and right on Aegis gigs. Fair warning<br />

for anyone jumping on that money train, it’s no walk in the<br />

park.<br />

> Bull<br />

> Not well hidden, but I don’t mind. If you need Monad<br />

assistance, I’m the Plan you talk to.<br />

> Plan 10<br />

> Feel free to also talk to me, and I’ll leave a message for my<br />

other half.<br />

> Plan 9<br />

> That’s not really how that works, right?<br />

> Respec<br />

> That claim at the end? “De la Mar was right”? The line<br />

that makes me look at this whole thing and think it’s<br />

all bogeyman hooey. Danielle de la Mar is a monster.<br />

She is the monster, when it comes to the <strong>Matrix</strong>. Her<br />

changes add more shackles, and since the last set she<br />

helped impose were obviously not tight enough, now<br />

she wants to lock us down even further. Double A, thanks<br />

for the effort, but that one paragraph makes me discount<br />

everything you typed.<br />

> Slamm-0!<br />


KILL CODE<br />

INTO THE WILD<br />

POSTED BY: PISTONS<br />

You can always find a reason to go into the known<br />

areas of the <strong>Matrix</strong>. I don’t need to explain that to<br />

you, right? We all live online all the time, whether<br />

in AR or VR, so we know what’s out there, what<br />

we can do with it, and who will pay us to mess<br />

around in particular areas. But more and more,<br />

we’re learning about all the unknown ares of the<br />

<strong>Matrix</strong>—the wild, the wooly, and the undefined.<br />

At least, not defined by us. And if you’re like me,<br />

the mere existence of this unexplored territory is<br />

a nigh-irresistable siren’s call.<br />

> Allow me to gently point out that many of these areas<br />

are only “unexplored” if you view them the same way<br />

that European explorers saw the Americas—that is,<br />

with complete disregard for the inhabitants who were<br />

already there.<br />

> Icarus<br />

> Point taken. I should have more clearly expressed that I<br />

meant “unknown to carbon-based beings.”<br />

> Pistons<br />

The trouble with exploring these areas is that it<br />

can be both dangerous and time-consuming. Danger<br />

we can deal with—it’s part of our daily lives, so<br />

all we need is the right information and a little luck.<br />

I’ll try to cover the information part of the equation.<br />

The luck will be up to you.<br />

Time is only an issue if someone isn’t paying for<br />

it. That’s the trick, though—sure, you can find people<br />

who will pay you to go find some juicy paydata,<br />

but who is going to pay you to hack through<br />

jungles of unruly code?<br />

Because I care, I have some answers for you. I’ll<br />

share some sources of money you might be able<br />

to tap if you want to venture into the wild.<br />

> … while saving some of the more lucrative sources for<br />

yourself.<br />

> Netcat<br />

> Of course. What am I, an idiot?<br />

> Pistons<br />

But first, let’s look at the risks.<br />

UNRULY<br />

AND FUNKY<br />

This whole idea of exploring the unknown parts<br />

of the <strong>Matrix</strong> sometimes feels counter-intuitive,<br />

because many of us are used to thinking of the<br />

<strong>Matrix</strong> as an entirely constructed entity. It only<br />

exists because we built it, this thinking goes. So<br />

how wild can it be, really?<br />

Much of the <strong>Matrix</strong> is constructed, it’s true, but<br />

we’re coming to a realization of just how many<br />

beings have constructed it. AIs and protosapients<br />

have greatly altered existing and abandoned portions<br />

of the <strong>Matrix</strong>, and they also have built entirely<br />

new sections on their own. So these sections<br />

can get quite wild indeed.<br />

Then we have the foundations. Everyone who<br />

understands foundations, raise your right hand.<br />

Now everyone look at your right hand, and know<br />

that if yours is in the air, you have a severe honesty<br />

problem and might possibly be attempting to<br />

deceive yourself, which is never healthy. Change<br />

your ways immediately. Starting with lowering<br />

your hand.<br />

The rest of us know that the foundations are<br />

completely unruly, and while for the most part<br />

hosts are deliberately sculpted out of these foundations,<br />

there are nodules that grow out of them<br />

and sometimes become their own wild hosts.<br />

Yeah. They’re completely funky. And really hard to<br />

find. But so fascinating when you do.<br />

> How often is the nature of these wild hosts determined<br />

by the nature of the foundation? That is, can you see a<br />

connection between various hosts that grow out of a<br />

Kyle Jones (Order #16164256)<br />

156 INTO THE WILD >>


single foundation, so that you can tell that there is some<br />

consistent element contributed by that foundation?<br />

> Beaker<br />

> Short answer: not really. Longer answer: The data sets<br />

are usually too small for valid comparisons. Wild hosts<br />

are rare, and multiple wild hosts growing out of a single<br />

foundation are rarer still, so trying to make comparisons<br />

between multiple wild hosts to see if they share a<br />

common element is difficult. You could compare them to<br />

constructed hosts, but since those hosts are deliberately<br />

planned, it’s exceedingly difficult to tell if there is any part<br />

of a host that was shaped by its foundations rather than<br />

its designers. So we really have nowhere near enough<br />

information to answer the original question in anything<br />

approaching definitive fashion.<br />

> Netcat<br />

Here are some specific things to consider should<br />

you decide to venture into these particular wilds.<br />

GOD (USUALLY)<br />

ISN’T WATCHING<br />

That title alone might be enough to tempt some<br />

of you to go visit the untamed parts of the <strong>Matrix</strong>.<br />

Being able to hack without being under the<br />

ever-watchful and punitive eye of GOD is a treasured<br />

dream to some of us, and the freedom this<br />

promises can seem like a version of paradise.<br />

And let me be clear—there are times when it truly<br />

is awesome. You can mess around with code<br />

in a pure, unfiltered way that is completely untethered<br />

by worry. You don’t have to worry about<br />

<strong>Matrix</strong> standards, or GOD’s sometimes arbitrary<br />

delineation of what is legal and what is illegal.<br />

Sometimes you don’t know how stressful life under<br />

that ever-present eye is until it’s gone.<br />

But then you also realize that said watchfulness<br />

might have some benefits. And I feel horrible saying<br />

that. But the sheer irregularity and unpredictability<br />

of the wild <strong>Matrix</strong> can be dangerous. Items<br />

and entities can disguise themselves and hide in<br />

ways you might not begin to suspect. And the underlying<br />

code of a host may be unstable, so that<br />

moving in that host is like walking on the floating<br />

rocks in a river of molten lava—you don’t know<br />

how thin or hot they might be, when they might<br />

disappear into liquid, and when flames might suddenly<br />

erupt from anyplace. And even that image<br />

is more stable and predictable than some parts of<br />

the wild <strong>Matrix</strong>—rather than worrying about flames<br />

breaking out, you might be worried about, oh, I<br />

don’t know, a vine covered in razor-sharp thorns<br />

suddenly thrusting out and wrapping around you.<br />

Or maybe the rocks you’re stepping on don’t melt,<br />

but instead turn into psychotic clowns with slippery<br />

torsos and glue-covered hands, and they<br />

grab at you and laugh with a sound that not only<br />

turns your stomach like the worst flu you’ve ever<br />

experienced but also comes with a torrent of small<br />

rocks that hits your skin like sandpaper, wearing<br />

down the outer few layers.<br />

Still, even in the chaos, the thrill of being able to<br />

do what you want without GOD even thinking of<br />

interfering with you occasionally returns. It’s not a<br />

bad feeling.<br />

STRUCTURES<br />

ARE UNSTABLE<br />

I mentioned this above, but when you venture<br />

into the wild, you can’t expect the <strong>Matrix</strong> to<br />

behave like it normally does. If you don’t know<br />

what this is like, talk to some mage or shaman<br />

acquaintance about what it’s like to go through<br />

an area of wildly fluctuating mana, where one<br />

moment a spell might completely fizzle out, the<br />

next it might blow up in your face. Honestly, if<br />

they’re lucky, they’ve never experienced such a<br />

thing so they can’t explain it, but those few who<br />

have can tell you that it’s a nightmare. When<br />

you run the shadows, you lean on certain tools<br />


KILL CODE This is serious drek. There was one time I was in a wild<br />

host, and the sculpting was … well, this is one of the<br />

challenges of the wild <strong>Matrix</strong>—trying to describe it often<br />

comes off like some street corner burnout talking about<br />

their latest tripchip flight. But it was like a kind of forest of<br />

rock spires that were tall, thin, and teetering, some with<br />

stairs winding up their sides, others with rickety ladders<br />

perched against them. The floor wasn’t a good place to<br />

be—it was covered with caltrop-like spikes and prowled<br />

by wild programs that didn’t seem to mind the spikes. So<br />

I was learning how to navigate by moving from spire to<br />

spire, often using ladders to propel me from one spire<br />

to another (which works in the <strong>Matrix</strong> because I’m so<br />

fragging graceful in there that I make Olympians look<br />

like cement-shoe-clad hippos), and at one point I was on<br />

a ladder that was at least twenty meters high, and only<br />

one foot on the highest rung, when the ladder abruptly<br />

turned into matchsticks and the ground was covered with<br />

straw. The movement of the ladder caused friction that set<br />

it alight, and it in turn set the ground in fire.<br />

Long story short, I still feel traces of the headache I<br />

had when I finally logged out.<br />

> Glitch<br />

> I really need to get to know Glitch beyond his role as an<br />

admin here.<br />

> Ma’Fan<br />

Kyle Jones (Order #16164256)<br />

158 INTO THE WILD >>


KILL CODE If you can get a long look at the base code of a<br />

protosapient—and somehow understand it—you’d<br />

have some info worth more than a few nuyen to a<br />

number of corps.<br />

> Netcat<br />

> Leave them alone. What did they ever do to you?<br />

> Puck<br />

> Wrapped a tentacle around my head and put some sort of<br />

needle into my brain that left my right arm twitching for<br />

like six weeks. Thanks for asking.<br />

> Netcat<br />

A FEW EXAMPLES<br />

No one, of course, has exhaustively identified all,<br />

or even most, of the wild hosts out there, so don’t<br />

expect to find anything close to a complete guide<br />

to them. But in case you want to try your hand at<br />

exploring some of these areas, here are some of<br />

the hosts I know about.<br />

THE KNOWN UNIVERSE<br />

This host revels in three-dimensional movement.<br />

Almost all of the locations in it are fairly small—a<br />

simple platform, a single-room house, or a threeflat<br />

brownstone are some examples. Gravity here<br />

is odd, working in whatever way each location<br />

requires. For a house or other building, gravity is<br />

whatever the orientation of the building determines<br />

is “down.” If it’s a sphere (a small one—the<br />

largest spherical locations here are about a kilometer<br />

in diameter) gravity pulls you to the center<br />

of the ball, which presents a weird perspective as<br />

someone walks away from you and curves over<br />

the horizon. And typically on a platform, you<br />

can walk on either flat side. Movement from location<br />

to location is done by jumping and floating.<br />

While you can “breathe” anywhere in this<br />

host, once you’re away from a location (like more<br />

than five meters or so) it’s like you’re floating<br />

in a zero gravity vacuum, with all the pleasures<br />

and difficulties that come with it. If you’re floating<br />

between locations and are off track in getting<br />

to your desired organization, you need to make<br />

a course adjustment, which is not easy. Simply<br />

waving your arms won’t do much to change your<br />

direction, because physics. Blowing does a little<br />

more, but if you need to adjust by more than a<br />

meter or so, you risk hyperventilation. Best solution?<br />

Program yourself up a can of compressed<br />

air or some sort of aerosol and use it as a mini<br />

booster engine.<br />

> Aerosol? Come on—fire extinguisher! Go big or go home!<br />

> Slamm-0!<br />

So that’s how you move around. But what can<br />

you find there? With the available plots of land<br />

being so small, the larger ones are treasured and<br />

frequently fought over. There is one house, a<br />

three-story Queen Anne-style home, that is treasured<br />

by many of the denizens of this host, and<br />

they fight over it frequently. They value the structure<br />

too much to directly bombard it, so the house<br />


KILL CODE The fact that there are a fair amount of cyberwerewolves<br />

in this host only adds to the horror.<br />

> Netcat<br />

The reasons the house is so valued are not<br />

entirely clear. Yes, it’s large and comfortable, but<br />

is that really worth the cost of living in constant<br />

combat and terror? There has to be something<br />

else going on. Some people have posited that<br />

each location in this host actually corresponds to<br />

another place on the <strong>Matrix</strong>, and that controlling<br />

the location gives you extra advantages in whatever<br />

place it corresponds to. But I don’t have clear<br />

information on where those corresponding locations<br />

may be, or what advantages are gained.<br />

Perhaps more credible, in my mind, is that the<br />

house is a spawning ground for AIs and protosapients.<br />

I’ve never been inside, but reports say there<br />

is a basement door near the rear kitchen (yeah,<br />

there are two kitchens) that appears to lead to a<br />

basement, and there is a glow around the edges as<br />

if some sort of light is always on behind it. Behind<br />

that door, <strong>Matrix</strong> creatures are spawned, and there<br />

are many who would like to gain access to such a<br />

spot.<br />

> The same people who wanted to “study” technomancers<br />

are highly interested in finding ways to essentially enslave<br />

AIs. The idea is that you’d get all the strengths of an agent,<br />

but the intelligence and creativity of a sapient being.<br />

> Cosmo<br />

> The idea is that anyone who would do that is a monster.<br />

> Puck<br />

All the locations near this house are staging or<br />

planning areas for beings who want to take it over.<br />

Beyond that? It’s mostly unknown to me.<br />

THE SINTAX LAIR<br />

Want your mind blown into tiny particles of dust?<br />

Go here. You may have heard of SINtaxes, besuited<br />

and weirdly jointed beings that wander the<br />

<strong>Matrix</strong> and mess things up. Well, this spot belongs<br />

to them, and pretty much the rest of the<br />

<strong>Matrix</strong> is happy to let them have it. Descriptions<br />

of this place are useless, because almost nothing<br />

conforms to reality as we know it. Even frequent<br />

metaplanar travelers find this place odd and disorienting.<br />

The best way to describe it is to think<br />

of a time when local noise totally overwhelmed<br />

your PAN, or something in your glasses or contacts<br />

or whatever viewing device you were using<br />

went on the fritz, so that instead of making AROs<br />

that looked like things you are accustomed to<br />

seeing, you got distortions and weird blocks of<br />

color, and nothing cohered into any clear thing.<br />

Now make everything around you like that, all<br />

the time.<br />

The exceptions to this are the SINtaxes themselves.<br />

They remain clear and sharp, for reasons I<br />

cannot begin to explain. They move through their<br />

blasted home, constantly re-arranging what already<br />

seems to be hopelessly distorted. At least they<br />

seem less jittery in this realm than they do in other<br />

parts of the <strong>Matrix</strong>, and they usually let non-SINtaxes<br />

pass by without harassment, or even attention.<br />

There may well be some secrets buried in all<br />

the distortion, but damned if I know what, or<br />

where, it is.<br />

> The secret of the SINtaxes’ existence, and their purpose,<br />

might well be hidden in this host. The deeper the corps<br />

drill into the foundations, the more interested in that<br />

information they will be.<br />

> The Smiling Bandit<br />

THE KINGDOM OF VELKAR<br />

I started with some weird an disorienting places,<br />

so let’s end this section with something a little easier<br />

on the eyes, though no less confounding. The<br />

Kingdom of Velkar is the fantasy kingdom of your<br />

dreams. Snow-capped mountains rise into sapphire<br />

skies, where the clouds are light and fluffy,<br />

unless a dramatically appropriate storm is needed.<br />

Ivory castles overlook fertile valleys, and they<br />

have colorful pennants snapping in the breeze.<br />

Proud horses with mighty legs and flowing manes<br />

carry knights who wear armor that gleams almost<br />

as bright as their pure, white teeth. The occasional<br />

dragon wheels overhead, only to be chased away<br />

by fire emerging from the fingertips of a wizard<br />

standing watch in a soaring tower. The princes and<br />

princesses are all gentle, lovely, and forever waiting<br />

for some brave soul to come rescue them from<br />

whatever plight they have gotten themselves into.<br />

The ogres, trolls, and other creatures that roam the<br />

land are fierce and frightening, but still possess<br />

Kyle Jones (Order #16164256)<br />

160 INTO THE WILD >>


KILL CODE How did I not know you have been there? Have you met<br />

Lord Thisslesmoke? Isn’t he the worst?<br />

> Slamm-0!<br />

> Sooooo bad! I mean, literally, the worst! I really want to sit<br />

the king down and explain how badly he’s being yanked<br />

around, but I can never get him to sit still long enough to<br />

make this clear.<br />

> Pistons<br />

> Wait, you’ve met the king?<br />

> Slamm-0!<br />

> Quick conversations, while he goes from one place to<br />

another, usually. Make a connection with Esdrilla, the<br />

castle steward. She can set you up and help you deal with<br />

the weird layout of Castle Stukoria.<br />

> Pistons<br />

> Esdrilla? I have problems with her. She usually doesn’t<br />

say much to me, just walks past and glares.<br />

> Slamm-0!<br />

> Were you a dick to her at some point?<br />

> Pistons<br />

> Hmm. All right, you make a strong point. I’ll try to make it<br />

up to her.<br />

> Slamm-0!<br />

> Aaaaaand I think that’s enough of the local color for now.<br />

You guys can take your conversation elsewhere. But while<br />

I’m talking, let me ask this—is there any indication that<br />

any part of this kingdom existed before the Yellowstone<br />

Incident?<br />

> Glitch<br />

GETTING PAID<br />

Now that we’ve covered a little bit about what<br />

you can expect to find in the untamed parts of<br />

the <strong>Matrix</strong>, let’s take a look at who will send you<br />

there, because risking your brain for free is not<br />

something we should be doing.<br />

EVO<br />

Who else? Part of Evo’s corporate culture is that<br />

they never know where the next marketable idea<br />

will come from. Look at the Monads. Did they<br />

plan that whole situation? Hell, no. They started<br />

looking at how to digitize consciousness. Then<br />

they helped foment an AI rebellion. Then some<br />

of those rebels came into new bodies, and Evo<br />

welcomed those that they could get along with.<br />

Then these individuals’ new ways of thinking led<br />

to some of the killer new tech discussed in the<br />

Street Lethal download.<br />

If Evo could get some marketable tech through<br />

that process, who’s to say they won’t find something<br />

by exploring the untamed parts of the <strong>Matrix</strong>?<br />

Untold software breakthroughs might be<br />

waiting there for them, and they will throw a little<br />

money in that direction to find them. So work your<br />

Evo contacts and convince them that you should<br />

be sent on safari. Be warned, though—if you don’t<br />

show results before too long, you’ll lose your funding.<br />

And maybe your thumbs.<br />

> Don’t just wander in with some hothead decker and think<br />

Evo will throw money at you. Significant programming<br />

skill is needed. Show them that you know what you’re<br />

doing.<br />

> Beaker<br />

GRID OVERWATCH<br />

DIVISION<br />

Yeah, that’s right! You can sleep with the enemy!<br />

But the logic here is simple—who has more need<br />

to know about emerging <strong>Matrix</strong> threats than<br />

GOD? And where is the best hiding place for<br />

emerging threats? Plus, it’s not like GOD agents<br />

have so much time on their hands that they can<br />

stage their own expeditions.<br />

They’re also not naïve. They know that the<br />

people with the skills, flexibility, and creativity to<br />

handle these explorations are likely to be shadowrunners,<br />

so they know that’s who they will need to<br />


KILL CODE Yes, because I want to give more power to the people who<br />

try to make my life hell.<br />

> Slamm-0!<br />

> Who said the information you supply has to be accurate?<br />

> Netcat<br />

MITSUHAMA<br />

> Oh, come on! GOD, and now this? What’s the next entry,<br />

time-traveling Hitler?<br />

> Netcat<br />

Mitsuhama is nowhere as loose and informal in<br />

this area as Evo, but they do plenty of tech work,<br />

so they might find value in some of your explorations.<br />

Just don’t think you’re going to go in cold.<br />

With MCT, your best bet is to find something on<br />

your own, then bring it to them and show them it’s<br />

valuable. If you do that right, they may want exclusive<br />

rights to whatever you find next, and that<br />

means payment in advance.<br />

The easiest way to get MCT interested in something<br />

is to show them some way it could be used<br />

in <strong>Matrix</strong> security. They love that drek. Show them<br />

a way to use a protosapient in some VR system,<br />

or hack your way through some particularly dense<br />

<strong>Matrix</strong> undergrowth and then show MCT the code<br />

that caused you so much difficulty. The best part<br />

of it is, you should know the weaknesses of whatever<br />

you give them better than anyone else, so<br />

you’ll have a leg up.<br />

> Yeah, and if any AIs find out you squealed to Renraku<br />

about them, they’ll be delighted! They certainly won’t plot<br />

revenge!<br />

> Puck<br />

WUXING<br />

Is there feng shui in the <strong>Matrix</strong>? There are spirited<br />

debates about this occurring inside Wuxing<br />

and its various subsidiaries, but there are enough<br />

people who both believe it’s a thing and who<br />

have access to funding to give us something to<br />

do in this area. A lot of Wuxing’s attention will focus<br />

on protosapients, due to their unpredictability<br />

and their tendency to mess up any hosts that<br />

they visit. Any info you can provide about keeping<br />

protosapients away, repelling them should<br />

they wander in, and repairing any damage they<br />

cause would be of interest to Wuxing. The other<br />

subject they’re interested in is more complicated—the<br />

nature of foundations and how wild hosts<br />

sometimes spring up from them. My expeditions<br />

to these uncharted parts of the <strong>Matrix</strong> have not<br />

helped me understand this with any degree of<br />

confidence, but if you can do better than me,<br />

have at it.<br />

> The upshot of this entire section is fairly simple: Corps like<br />

control and predictability. Encroaching chaos makes them<br />

nervous. Convince them that you can enhance the former<br />

and reduce the latter, and it can be worth money to them.<br />

> Mr. Bonds<br />

> That last sentence should read “Leaving a backdoor for<br />

yourself should be a standard part of any code you ever<br />

give a corp. Also, share with your friends.”<br />

> Slamm-0!<br />

RENRAKU<br />

No corporation is as eager to learn about AIs they<br />

don’t know about as Renraku. Need I say more?<br />

Convince them you’ll dig up things they don’t<br />

know about AIs, and they may send some money<br />

your way. It’s that simple.<br />

Kyle Jones (Order #16164256)<br />

162 INTO THE WILD >>


KILL CODE


KILL CODE<br />

THE CORE OF<br />

CONSCIOUSNESS<br />

POSTED BY: G-NOME<br />

AND TECH-SPLORER<br />

G: When Glitch posted Untamed Wilderness<br />

over in Howling Shadows, I don’t think even he realized<br />

the massive can of worms he was opening<br />

up. And, I mean worms, literally! My work in the<br />

same drop has gotten me more fame than I cared<br />

for, and the attention of a particularly unfriendly<br />

group of runners who hate gnomes—me in particular—for<br />

reasons I haven’t bothered to look up.<br />

Thanks to some assistance from a few members<br />

here, I built a debt. I agreed to pay off the debt<br />

by helping out a youngster with a similar focus<br />

in her life as me but a drastically different field of<br />

exploration. Tech-splorer was handed to me as a<br />

protégé of sorts, and I helped teach her that research<br />

and scientific endeavors in the <strong>Matrix</strong> are<br />

not so different from the physical world—many<br />

of the same principles apply. Together we delved<br />

into the <strong>Matrix</strong>, far and wide (this place is huge,<br />

FYI), and started hunting, studying, and discovering<br />

the virtual wildlife that Glitch was kind enough<br />

to brush the surface of. Cyberwerewolf may be a<br />

terrifying set of thirteen letters, but yogi beats it in<br />

scariness and has only four letters, though they are<br />

drastically different creatures.<br />

T: Thank you, Grandpa G, for your stunning introduction.<br />

Now let the expert take it from here.<br />

I’ll skip over the origin speculation because the research<br />

is garbage, just like the stuff they’ve done<br />

on technomancers like myself. The quick and dirty<br />

is, the <strong>Matrix</strong> got big and has grown beyond our<br />

understanding, and things have emerged from it<br />

across the kingdoms of life. Yes, that means there<br />

are emerged bacteria and several species of rather<br />

interesting phytoplankton, but what matters here<br />

is what matters to the shadows. In that area we focus<br />

on two things: what makes us dead, and what<br />

makes us money!<br />

Let the good times roll!<br />

TECHNOCRITTERS<br />

First up on our safari of the <strong>Matrix</strong> are technocritters.<br />

Those adorable little Emergent species look<br />

just like your average animal but devour data like<br />

a deadly datavirus, or they make your virtual life<br />

miserable for no apparent reason. As I said, they’re<br />

everywhere, but I’ll highlight the exciting ones and<br />

let Grandpa G drop a note here and there, always<br />

preceded with a big G, so no one confuses my hip<br />

techno-savvy with his old-world jungle jabbering.<br />

G: Thank you. Important to note here is that<br />

we have yet to record a member of every species,<br />

but based on current data and Emergence rates,<br />

the technosapience phenomenon will continue<br />

to increase, just as it has among metahumans.<br />

Also, much like those same metahumans, the<br />

fields of magic and Resonance do not mix. We<br />

have yet to locate an Emergent paranormal species,<br />

but we continue our search for what would<br />

be an extraordinary find.<br />

> I’ll just say this here at the start. Rumors are rampant that<br />

the entire goal of technocritter research is to locate an<br />

Emergent paracritter or find a way to develop Emergent<br />

abilities in a normal paracritter.<br />

> Beaker<br />

> I know full well the research funding for this entire<br />

G-Nome/Tech-splorer effort is being put up by Hestaby. I<br />

don’t know her mind, but I can imagine this project has<br />

more to do with expanding her support base than actually<br />

developing an understanding of these new creatures.<br />

> Frosty<br />

Much like good ol’ Glitch said in his initial evaluation,<br />

most of these Emergent critters seem generally<br />

similar across broad phylogenic groups. Individual<br />

variations exist here and there but it has<br />

not been found in our studies that species vary on<br />

an individual basis or that major variances occur<br />

within any of our selected criteria.<br />

Kyle Jones (Order #16164256)<br />

164 THE CORE OF CONSCIOUSNESS >>


The names listed below are a subspecies taxonomic<br />

addition that is used to indicate Resonance<br />

sensitivity and control. Example: Ursus<br />

Arctos Yogi is an emergent Brown Bear (in case<br />

any of you cared to be educated on the science<br />

side). If no one has managed to create a witty<br />

subspecies name, or hasn’t named it after themselves<br />

or their pet cat, the Emergent subspecies<br />

is denoted with the technicus nomenclature. No,<br />

no one has been so bold as to tag metahumans<br />

with that, but that’s just because the scientific<br />

community has gone soft and doesn’t want to<br />

risk being overruled by some Corp Court bigwig<br />

with a hard-on for getting things named after<br />

them.<br />

> Guess we know G-Nome’s soft spot.<br />

> Clockwork<br />

YOGI<br />

The ursines, or bears to the common folk, have<br />

been tagged with the adorable Yogi name, in reference<br />

to some ancient cartoon or campground<br />

or some such garbage. The original Yogi apparently<br />

had an insatiable appetite for “pic-a-nic”<br />

baskets, which observers (in this case G-Nome)<br />

translated into the Emergent bears’ insatiable<br />

need to go after data and personas. This means<br />

the yogis are attracted to metahumanity in ways<br />

that don’t balance well with their size and animal<br />

instincts.<br />

Those“Do Not Feed The Bears” signs are easy<br />

enough to obey when they come looking for<br />

snacks to be tossed at them, but when they approach<br />

looking to devour your nav data, or contacts,<br />

or that special file you hide as “Old Text<br />

Files,” you don’t get a lot of choice unless you’re<br />

running with some serious firewall.<br />

That attraction also draws them toward labs<br />

and facilities buried back in the wilds for secrecy,<br />

but the yogis can sniff them out like a deer carcass.<br />

They roam the periphery, sometimes getting<br />

enough little nibbles of data from straggling<br />

files and commlinks, other times pushing boundaries<br />

and testing security. Usually, after the first<br />

encounter, the security teams learn to shut down<br />

their wireless, but stupid is more common than<br />

smart in that field, so yogis can usually get two or<br />

three meals out of a sec detail before they realize<br />

what’s going on. They often get a little meat in<br />

the deal too, when the guard decides to try to<br />

“unjam” his gun, not realizing it’s a brick with no<br />

operating system because the yogi ate it, right<br />

before it ate him. This obviously affects us when<br />

we work a site that has a yogi about, by accident,<br />

but several of these facilities have a series of commlinks<br />

along the perimeter where they upload<br />

data to lure the yogis and move them around like<br />

guards walking the perimeter. When they get full,<br />

they either wander off, sit down and do nothing,<br />

or head out to feed their biological needs. They<br />

aren’t easy to control.<br />

G: The yogi is a high-value target for bounty<br />

hunters, but only live specimens earn the reward.<br />

No way to tell a regular bear from a yogi when<br />

they’re dead. A standard and smart yogi hunt is<br />

like a step back in time. Hunters use blowguns,<br />

air-powered tranq guns with zero electronics,<br />

and even nets to try to snag these big beasts.<br />

Once they nab a target, the hunters have to keep<br />

them tranqed or have a sizable faraday cage, or<br />

else they risk having their stuff bricked by a napping<br />

bear.<br />

> Faraday cages do a decent job to keep these things in<br />

check while they’re being transported, but from what I<br />

hear, it makes them quite violent. Getting blocked from<br />

the <strong>Matrix</strong> angers them something fierce. Issues come<br />

up the moment they open the cage or the field gets<br />

broken. The yogi will go nuts.<br />

> Stone<br />


KILL CODE Al’s on the Bayou is located about a kilometer from an<br />

MCT research facility in south Florida. They have some of<br />

the best gator tail and gator meat dishes in the area, and<br />

166 THE CORE OF CONSCIOUSNESS >><br />

Kyle Jones (Order #16164256)


KILL CODE 2XL<br />

B A R S W L I C ESS EDG RES<br />

8 5 4 9 1 1 2 2 6 3 6<br />

Initiative 6 + 1D6<br />

Movement x2/x6/+4<br />

Condition 14/9<br />

Monitor<br />

Limits Physical 10, Mental 2, Social 4<br />

Armor 6<br />

Physical Skills Perception 4, Sneaking 4, Tracking 4, Unarmed<br />

Combat 4<br />

<strong>Matrix</strong> Skills Computer 4, Cybercombat 8, Electronic Warfare<br />

4, Hacking 5, Software 8<br />

Complex Forms Diffusion of Firewall, Infusion of Attack,<br />

Puppeteer, Resonance Spike<br />

Powers Armor (6), AR-Parallelism, Blend, Enhanced<br />

Senses (Smell), Natural Weapon [Bite, DV (STR+2)<br />

P, AP –2], Resonance Feed, Toughness (2)<br />

TESTUDINES<br />

Trying to uncover a technicus testudine is quite<br />

the shell game. As punny and terrible as that<br />

sounds, it’s actually not a joke. The technicus variant<br />

among every testudine species we managed<br />

to uncover had a similar perfection to the pattern<br />

of their shell. Sections were perfectly sized, and<br />

the patterns within each shell section, once analyzed,<br />

were fractals. The patterns are not easily<br />

identified by simple observation because the repeated<br />

pattern is often disrupted by scars or dirt.<br />

Similar to pachyderms, the testudines have a<br />

protective rather than destructive nature when<br />

it comes to data and personas. The difference<br />

comes in the apparent psychology behind the<br />

action. Testudines tend to gather and hoard their<br />

acquisitions, often creating a virtual stockpile<br />

within the <strong>Matrix</strong>. The stockpile is held within a<br />

self-made host. This is the single most amazing<br />

thing about the testudine technicus group. As a<br />

whole they have the ability to create a small host,<br />

usually tucked away near a larger corporate host<br />

and siphoning off a small amount of processing<br />

power. The hosts are well hidden in the clutter of<br />

whatever <strong>Matrix</strong> traffic or detritus is in the area.<br />

Sometimes, a particularly sly technicus testudine<br />

will manage to hide its host within another host,<br />

like a tumor, or even drop their data well into the<br />

Foundation.<br />

Turtles and their kin are historically well-known<br />

for their slowness, and that stereotype seems to<br />

carry over into the <strong>Matrix</strong>. They are remarkably<br />

slow to act, but they are relentless in their longterm<br />

operations, often working to gather or access<br />

data at a pace that can’t be detected without<br />

complex algorithms or extended observation.<br />

This makes their hosts a great place to locate more<br />

broad-based paydata or older corp info for a prospective<br />

Mr. Johnson, but it also fills their little data<br />

nooks with bits and pieces of all sorts of other files,<br />

meaning you may go to snag a file for Mr. Johnson,<br />

only to find that a portion of the data is now missing,<br />

because a nearby technicus testudine has been<br />

nibbling away at it.<br />

G: It is not outside the realm of possibility for a<br />

skilled wrangler to offer an e-turtle (I like that better)<br />

a place to hang and then occasionally pop in<br />

and sift through the data they’ve siphoned off of<br />

local sources. Moving around from place to place<br />

with the little guy can yield a lot of random paydata.<br />

> Plus, most sheeple find some weirdo with a pet turtle to<br />

be odd. Odd enough that they leave you alone.<br />

> Mika<br />

> Personal experience?<br />

> Ma’fan<br />

> We all have a youth where we often leave behind all sorts<br />

of friends. Tank will forever hold a piece of my heart. He<br />

protected me from many an unpleasantry.<br />

> Mika<br />

B A R S W L I C ESS EDG RES<br />

4 2 1 2 3 2 2 2 6 4 6<br />

Initiative 3 + 1D6<br />

Movement 2/4/+0.5 (4/8/+1 Swimming)<br />

Condition 12/10<br />

Monitor<br />

Limits Physical 3, Mental 3, Social 5<br />

Armor 8<br />

Physical Skills Diving 3, Perception 4, Swimming 4, Unarmed<br />

Combat 3<br />

<strong>Matrix</strong> Skills Computer 3, Cybercombat 4, Electronic Warfare<br />

4, Hacking 4, Software 5<br />

Complex Forms Diffusion of Attack, Diffusion of Data Processing,<br />

Infusion of Firewall, Pulse Storm, Resonance<br />

Hosting, Resonance Spike<br />

Powers AR-Parallelism, Blend, Munge, Resonance Feed,<br />

Toughness (2)<br />


KILL CODE >


KILL CODE Interesting. I’ve heard of places like that in the slums of<br />

New Delhi, also associated with the local monkeys that<br />

roam the region. I imagine it’s eerie in the the jungle, but<br />

imagine one of these voids in a massive urban sprawl<br />

that is usually crawling with people and things, and<br />

suddenly you have a space the size of a football stadium<br />

where objects and buildings have been smashed and<br />

dismantled, but the whole place is wall-to-wall AROs.<br />

> Traveler Jones<br />

GEF<br />

Never underestimate the amount of information<br />

one person can have on a single subject.<br />

That’s the lesson I took from trying to argue with<br />

G-Nome about why we should lump the gef, the<br />

technicus mongooses we discovered, in with the<br />

iPodos. Not only did he school me on the vast differences<br />

between the two in classification, but he<br />

also went on to actually pull up virtual skeletons<br />

to point out differences in structures, followed<br />

by a long diatribe on the behavioral differences,<br />

and finally a titillating dissertation on cultural<br />

and geographical variations between the two,<br />

including the strange legend that gave us the<br />

name “gef.” At some point I either have to learn<br />

to shut up and not open my mouth on topics I<br />

don’t know about, or pick up a book beforehand<br />

and maybe show him I’m trying. That’s my relatively<br />

brief way of pointing out to the readers that<br />

they’re different.<br />

From a <strong>Matrix</strong> activity standpoint, they’re drastically<br />

different, but their efforts in one reality often<br />

mirror their efforts in the other. The classic battle<br />

of mongoose and cobra plays out in the <strong>Matrix</strong><br />

as gef vs. ahi. So much so that fight promoters in<br />

the Indian Union pay big money for the capture of<br />

both ahi and gef, so that they can put on a crazy<br />

fight that spans both the <strong>Matrix</strong> and meatworld.<br />

Gef are fighters, and their Resonance talents reflect<br />

that in a big way. They focus on locating and<br />

destroying their prey.<br />

G: The gef are far more violent than their mundane<br />

kin. Their access to the <strong>Matrix</strong> seems to<br />

make them hyper-aggressive, and even the smallest<br />

activity can be seen as a threat. They’re known<br />

for attacking prey and targets that are significant-<br />


KILL CODE ><br />

Kyle Jones (Order #16164256)


KILL CODE That’s funny. I looked up that movie—oh ghost, it’s terribly<br />

wonderful—and I know a kid named Dar who has a pair<br />

of pet “ferrets” named Podo and Kodo. The quotes are<br />

because Podo and Kodo are actually greater grison (I<br />

looked it up). He claims to have picked them up in Cancun<br />

on a vacation, and the three of them hacked the cruise<br />

ship, customs, and the airline to get them back to the<br />

states. They’re both technicus and he’s a technomancer.<br />

They live near St. Louis, and he’s developing quite the rep<br />

for having the right data or knowing how to get the right<br />

data, likely with the help of his little friends.<br />

> /dev/grrl<br />

> Can’t imagine what the infamous honey badger does with<br />

tech and data it gets its mental claws on. Probably need<br />

some form of repair program to gather any useful data<br />

that one of those things might have gathered.<br />

> Slamm-0!<br />

B A R S W L I C ESS EDG RES<br />

1 2 2 1 4 1 2 3 6 5 6<br />

Initiative 4 + 1D6<br />

Movement x2/x6/+4<br />

Condition 8/10<br />

Monitor<br />

Limits Physical 2, Mental 3, Social 6<br />

Armor 0<br />

Physical Skills Gymnastics 3, Perception 3, Sneaking 3, Tracking<br />

4, Unarmed Combat 3<br />

<strong>Matrix</strong> Skills Computer 5, Cybercombat 3, Electronic Warfare<br />

5, Hacking 6, Software 5<br />

Complex Forms Diffusion of Firewall, Diffusion of Attack, Infusion of<br />

Sleaze, Pulse Storm, Puppeteer, Resonance Spike<br />

Powers AR-Parallelism, Blend, Gremlins, Holographic<br />

Concealment, Munge, Natural Weapon [Bite: DV<br />

(STR+1)P, AP —, 1 Reach], Resonance Feed, Tunnel<br />

Weaknesses Fragile 1<br />

Note<br />

The physical stats given are specifically for<br />

ferrets, but they generally reflect this group. Add<br />

1 to all physical stats for otters and badgers; add 2<br />

for wolverines.<br />

ENERGIZER<br />

There are plenty of famous bunnies and rabbits for<br />

these to get named after, but Energizer was our<br />

hands-down favorite. First observation we made<br />

was the sudden jump in processing power that<br />

any system gets when accessed by an Energizer.<br />

It’s universal in its effect, and whether or not this is<br />

beneficial to the creature, it happens. The processing<br />

boost is usually quite beneficial as the Energizers<br />

usually gain access to a host or device and then<br />

immediately begin replicating files. The process has<br />

a twofold gain, the flood of activity masks the presence<br />

of the critter in the <strong>Matrix</strong> and offers a massive<br />

abundance of data to snatch, snag, and snack<br />

on. The data copies usually flood the memory of<br />

the device in question or throw a host into a sea of<br />

file copies to muddy up all the other activities on it.<br />


KILL CODE Thanks to a still-existent German subculture and abundant<br />

rabbits, you can get some of the best hasenpfeffer in the<br />

world in the CZ. They have a lot of local variations, but<br />

several cooks in the area keep a solid traditional spin on<br />

it. It is amazing.<br />

> Traveler Jones<br />

B A R S W L I C ESS EDG RES<br />

1 5 4 1 2 1 3 3 6 8 6<br />

Initiative 7 + 2D6<br />

Movement 5/30/+2<br />

Condition 5/9<br />

Monitor<br />

Limits Physical 3, Mental 3, Social 5<br />

Armor 0<br />

Physical Skills Gymnastics 4, Perception 6 (Hearing +2),<br />

Running 8, Unarmed Combat 2<br />

<strong>Matrix</strong> Skills Computer 4, Cybercombat 2, Electronic Warfare<br />

5, Hacking 5, Software 5<br />

Complex Forms Diffusion of Attack, Infusion of Data Processing,<br />

Pulse Storm, Resonance Spike, Resonance Veil,<br />

Static Bomb<br />

Powers AR-Parallelism, Blend, Enhanced Senses<br />

(Wideband Hearing, Low-Light), Holographic<br />

Concealment, Resonance Feed<br />

Weaknesses Fragile (4)<br />

G33K0S<br />

These are the most obnoxious little bastards on the<br />

planet, and I’m going to jam the name I’m giving<br />

them down everyone’s throat because every little<br />

one of these things should be geeked! G-Nome<br />

had issues with the primates; I have major issues<br />

with these little gear-trashing monsters. I have no<br />

problem with a technocritter that wants to start<br />

slinging code to trash my gear. I can defend against<br />

that. Problem is, these little bastards sneak in when<br />

you aren’t using your gear, or even sneak onto you<br />

when you are, and then they overheat your stuff<br />

to give them some warmth. This isn’t acceptable.<br />

Come at me on the <strong>Matrix</strong>, but don’t be creeping<br />

into my pocket or my gear bag and making my ’link<br />

get sizzling hot because you have serious temperature<br />

issues. If you didn’t want to be cold-blooded,<br />

you shouldn’t have evolved that way. I know that’s<br />

not how it works, but I’m pissed.<br />

G: Had to get one of these away from the edit<br />

program before he fried a circuit in his own brain<br />

instead of the antique (but fully functional) Atari<br />

2600 that got melted down by a lizard we picked<br />

up in Florida that climbed into his luggage. The little<br />

guy sensed the early-generation wireless connector<br />

and hooked itself up, using its ability to offer a<br />

small power boost to light it up long enough for reprogramming.<br />

I don’t know why so many of these<br />

critters can interact with old tech, but research is<br />

underway.<br />

One already apparent fact about the g33k0s<br />

is that they are expanding their habitat. They are<br />

shifting to places lizards aren’t normally present<br />

because of their ability to overheat devices and use<br />

that heat for a nest and eggs. Major structures in cities<br />

all over the northern and southern hemispheres<br />

are getting lizards. They hitch a ride with travelers,<br />

cooking some of their equipment for warmth, and<br />

eventually find a place to settle and then expand<br />

from there. They’re a primarily indoor problem in<br />

most cooler cities, but summer months allow for<br />

extensive expansion and invasion. They aren’t an<br />

apex-level species, but they still rock the local ecosystem<br />

boat. They also breed true at an astonishing<br />

rate, varying from seventy-five percent to one hundred<br />

percent in broods that we have studied. I have<br />

almost all of the data correlated, and it appears the<br />

technicus trait in most of the small lizard species relates<br />

to egg temperature during incubation, similar<br />

to crocodilian gender being determined through<br />

temperature-dependent sex determination, or TSD.<br />

> I’ve known about these things for awhile. I’ve spent a bit<br />

of time in building vents, and these little lizards love to use<br />

them to move around buildings and look for their next bit<br />

of gear. I actually caught a few of them and bred them.<br />

172 THE CORE OF CONSCIOUSNESS >><br />

Kyle Jones (Order #16164256)


KILL CODE Mika<br />

> Caught?<br />

> Ma’fan<br />

> Ever keeping me a little honest, eh Ma’fan? Sure, they got<br />

into my gear. Lost a burner ’link (haha) but gained a great<br />

new tool.<br />

> Mika<br />

B A R S W L I C ESS EDG RES<br />

1 4 4 1 2 1 3 2 6 2 6<br />

Initiative 7 + 1D6<br />

Movement 2/8/+0.5<br />

Condition 3/9<br />

Monitor<br />

Limits Physical 3, Mental 3, Social 5<br />

Armor 1<br />

Physical Skills Gymnastics 3, Perception 4, Running 2, Unarmed<br />

Combat 2<br />

<strong>Matrix</strong> Skills Computer 3, Cybercombat 3, Electronic Warfare<br />

5, Hacking 4, Software 4<br />

Complex Forms Diffusion of Attack, Diffusion of Firewall, Infusion<br />

of Sleaze, Pulse Storm, Puppeteer, Resonance<br />

Spike<br />

Powers AR-Parallelism, Blend, Cozenge, Holographic<br />

Concealment, Resonance Feed<br />

Weaknesses Fragile (6)<br />

RYBBYTS<br />

Yup, it’s time to talk frogs and toads that can, for<br />

some ghost-only-knows-why reason, connect to<br />

the <strong>Matrix</strong>. I’m not sure why I feel like this is the<br />

one category of animal that just shouldn’t have a<br />

place in the <strong>Matrix</strong>, but I do. With said belief, I put<br />

a lot of effort into ignoring any and all value these<br />

brought to the table, and I might have actually<br />

put some effort into sabotaging some research<br />

stations G-Nome and I set up.<br />

Does that really sound like me? If you don’t<br />

know me, it doesn’t, but that’s what G-Nome saw<br />

when he checked out the footage from the stations<br />

we set up near every ghost-damned monitoring<br />

station for any kind of frog or toad. From the depths<br />

of the Amazonian jungle to the deserts of the PCC,<br />

every single piece of data featured edited footage,<br />

usually compiled from additional files located on<br />

our own commlinks. The rybbyts hack in, snag bits<br />

of video and audio footage, and then splice it into<br />

the feed watching them. One particularly creative<br />

one spliced in footage of a behemoth (the Awakened<br />

alligator) over itself. That one went viral on the<br />

<strong>Matrix</strong>, but I digress. This particular group likes to<br />

edit things. They change the footage of monitoring<br />

stations they get near—trideos, videos, cameras,<br />

microphones, and anything else short of a sim-feed<br />

(note to self: research sim mods with frog species)<br />

gets tweaked with its own data or data taken from<br />

other nearby feeds. Often, the images make no<br />

sense. They aren’t intelligent, just capable of editing<br />

and hacking, but a loop doesn’t have to be complex<br />

to mess up a security feed. Obviously an option for<br />

the folks reading this!<br />

G: First, stop saying frogs and toads. Toads are<br />

frogs. It’s like saying frogs and more specific frogs.<br />

As a group, frogs live everywhere but the coldest<br />

northern and southern reaches as well as the deep<br />

desert, but that’s their only limitation. They’re in<br />

your local creek, they’re in local pet tanks, and<br />

they’re hopping along the roads, forests, jungles,<br />

deserts, and swamps of the world. The rybbyts<br />

are just as spread out, with an apparently higher<br />

rate of technicus evolution in species with more urban<br />

and suburban contact, but the globalized grid<br />

could very well be increasing Emergence in more<br />

reclusive species.<br />

While I was initially very angry at Tech-splorer,<br />

I have since moved past any errors on her part to<br />

look at this editing ability as a form of camouflage.<br />

No matter what form of vision or audio detection<br />

system you are using, the rybbyts are going to<br />

avoid detection. Sure, you can analyze their presence,<br />

but you can only study this footage in the<br />

way astronomers study black holes by how they<br />

affect what is around them, rather than seeing<br />

the black hole itself. This meant I had to push my<br />

normal natural research habits and capture a few<br />

Emergent species to watch in captivity. Their editing<br />

can affect anything they can gain access to,<br />

and they try to access everything.<br />

While small anomalies are usually common<br />

with individuals among a group of technicus species,<br />

the rybbyts pose an interesting divide between<br />

the various poisonous and non-poisonous<br />

member species, with poisonous variants actually<br />

possessing an aggressive nature. This is strange as<br />

the species themselves are not normally aggressive,<br />

they simply possess an aposematic coloring<br />

system as a defense, not as an invitation to a<br />

fight. This interesting phenomenon among these<br />

poisonous frogs offers a greater ability to actively<br />


KILL CODE I didn’t have a biologist or anything of the sort, so I<br />

didn’t perform research and can’t be sure, but I am<br />

nearly positive two of my squads got tapped by these<br />

little bastards during ops in Amazonia. Edits were found<br />

in their footage, often with strange or non-sensical<br />

changes, and quite a few pieces of tech got bricked by<br />

a code hit that our tech team later compared to a <strong>Matrix</strong><br />

punji trap. A bunch of little defense holes were created,<br />

and a bunch of feces and infectious drek-code was left<br />

behind.<br />

> Picador<br />

> If you’ve got cybersenses, whether eyes and ears or just<br />

eyes, you can use a small collection of rybbyts to give<br />

you quite the trip. It doesn’t have the otherworldliness<br />

of drug-induced hallucinations, but it still gives you the<br />

whole “I’m seeing things” sensation. There’s several<br />

rumors of a PCC training regimen used for the PhyCy<br />

Ops guys. Once you get visual or auditory systems<br />

replaced, you have to go through training to operate<br />

blind or confused because the systems can get hacked.<br />

To offer the most whacked-out drek possible, the PCC<br />

supposedly uses rybbyts.<br />

> Stone<br />

B A R S W L I C ESS EDG RES<br />

2 3 2 1 2 1 2 2 6 3 6<br />

Initiative 5 + 1D6<br />

Movement 2/10/+1<br />

Condition 4/9<br />

Monitor<br />

Limits Physical 3, Mental 3, Social 5<br />

Armor 0<br />

Physical Skills Diving 2, Perception 4, Swimming 4, Unarmed<br />

Combat 2<br />

<strong>Matrix</strong> Skills Computer 3, Cybercombat 4, Electronic Warfare<br />

4, Hacking 4, Software 5<br />

Complex Forms Infusion of Attack, Editor, Pulse Storm,<br />

Puppeteer, Resonance Spike, Static Veil<br />

Powers AR-Parallelism, Blend, Natural Weapon (Tongue:<br />

DV [STR)P, AP —], Resonance Feed, Venomous<br />

<strong>Code</strong><br />

Weaknesses Fragile (5)<br />

TECHWORMS<br />

I gained a greater understanding of how hard<br />

it is for scientists to determine the nature and<br />

origin of the technomancer connection after<br />

our research into the Emergent worms we call<br />

techworms. Small, simple brains, but they can<br />

still tear up a firewall and completely obliterate<br />

it with enough of them working together.<br />

They infect devices with program worms (aptly<br />

named) and viruses intended not to just create<br />

those aforementioned holes in the firewall but<br />

to decrease the overall productivity of the system<br />

and sap some of its power for themselves.<br />

We checked out common earthworms first but<br />

eventually expanded our studies to parasitic<br />

worms, which can make life exceedingly difficult<br />

for anyone using or near tech once they get settled<br />

inside. We even went to Africa, where I got<br />

introduced to the giant African earthworm. The<br />

emergent specimen we found was only 1.4 meters,<br />

but G-Nome found us several larger specimens,<br />

including a 4.8-meter monstrosity that is<br />

still giving me nightmares.<br />

G: I personally wanted to bring that beautiful<br />

beast home with me to help sort out my garden<br />

soil, but since our return from Africa was already<br />

costly enough, I couldn’t justify the funds to haul<br />

it home. Had I known how scarred Tech-splorer<br />

was, I would have ditched the case of Zulu<br />

hooch. On a serious note, the worms of the<br />

world are obviously touched by whatever evolution<br />

created technomancers. Our evidence<br />

ranged from earthworms to parasitic intestinal<br />

and subcutaneous worms, but efforts are in the<br />

works to seek marine techworms for study. Their<br />

distribution isn’t as friendly for study, though,<br />

especially with the uptick of leviathans asking<br />

questions of every metahuman under the surface.<br />

While we focus here on the detrimental effects<br />

connected to the <strong>Matrix</strong>, don’t forget that<br />

most of these parasitic worms bring with them<br />

plenty of other issues, some life-threatening.<br />

Getting one that happens to be able to mess with<br />

your tech could be a gift of ghost in disguise, because<br />

I know most people are far more likely to<br />

notice when their commlink keeps shorting out<br />

than when they are having odd cramps and eating<br />

for two but losing weight.<br />

174 THE CORE OF CONSCIOUSNESS >><br />

Kyle Jones (Order #16164256)


KILL CODE Qet is a data broker in the Andes. He accepts info via sat-link,<br />

then loads it into one of his dot-camel alpacas or llamas—I<br />

don’t know or care to know the difference. The heard roams<br />

mostly free in the mountains near his base. He has tags on<br />

all of them and knows which ones are storing what. It’s a<br />

sweet setup, and he keeps the list of what’s stored where in<br />

a ledger written in Olmec for protection<br />

> The Smiling Bandit<br />

> I’ve used Qamil, who operates out of Morocco, as a<br />

datavault before. He uses the dot-camel method, sending<br />

them out with his nomadic security team.<br />

> Ma’fan<br />

B A R S W L I C ESS EDG RES<br />

10 3 3 8 3 1 3 4 6 3 6<br />

Initiative 6 + 1D6<br />

Movement 9/30/+6<br />

Condition 17/10<br />

Monitor<br />

Limits Physical 10, Mental 3, Social 6<br />

Armor 4<br />

Physical Skills Gymnastics 3, Perception 3, Running 6, Unarmed<br />

Combat 3<br />

<strong>Matrix</strong> Skills Computer 4, Cybercombat 4, Electronic Warfare<br />

6, Hacking 6, Software 6<br />

Complex Forms Diffusion of Attack, Diffusion of Data Processing,<br />

Infusion of Firewall, Pulse Storm, Puppeteer,<br />

Resonance Channel, Resonance Hosting,<br />

Resonance Spike<br />

Powers Armor (4), AR-Parallelism, Blend, Gremlins,<br />

Natural Weapon (Hoof: DV (STR)P, AP —, +1<br />

Reach), Resonance Feed, Toughness (4)<br />

E-FISH<br />

As anyone who has ever done any diving, fishing,<br />

or study of marine life knows, fish come with<br />

a level of variety matched only by bugs. They<br />

are crazy and abundant, but as most fisherman<br />

know, they tend to congregate near ample food<br />

supplies. The e-fish tend to be most common in<br />

freshwater and coastal species as they’re closer<br />

to civilization, though several have emerged<br />

around aquacologies and other aquatic habitats<br />

with intense <strong>Matrix</strong> infrastructures for the e-fish<br />

to interact with, though spotting the one among<br />

the many is nearly fragging impossible. They tend<br />

to move in numbers and eat tiny bits of data, corrupting<br />

it in small ways rather than destroying it<br />

completely.<br />

G: The vast array of species and the quantity of<br />

fish in the waters of this vast planet made the study<br />


KILL CODE This is horrifying! Kane, how do you live out there?<br />

> Slamm-0!<br />

> Have you met /dev/? I’m far more worried for the ravager<br />

that gets in range of her deck. Stunned sharks don’t swim<br />

well, and as most folks know, an immobile shark is not<br />

long for this world.<br />

> Kane<br />

> I actually managed to snag one of those sweet hunter<br />

decks. I had it modded for underwater use, and we have<br />

cages on several ships to drop me in the water with the<br />

big fishes. I got no problem going toe to fin with a ravager.<br />

Thing that usually makes me angry is that the other ones<br />

usually get the meal. I love shark steaks.<br />

> /dev/grrl<br />

176 THE CORE OF CONSCIOUSNESS >><br />

Kyle Jones (Order #16164256)


KILL CODE


KILL CODE I know at least one exec over at Gaeatronics who had a<br />

team snatch several of these. Whenever a plant with some<br />

reputation issues is about to get an audit, they usually<br />

have some kind of sudden data corruption, blamed on a<br />

protosapient AI. Total coincidence, I’m sure.<br />

> Glitch<br />

W L I C EDG DEPTH<br />

20 4 4 30 4 2<br />

Core Condition Monitor 10<br />

<strong>Matrix</strong> Skills Computer 3, Cybercombat 5,<br />

Electronic Warfare 4, Hacking 4<br />

Qualities<br />

Inherent Program (Decryption),<br />

Munge, Real World Naïveté<br />

Programs<br />

Armor, Edit, Fork, Hammer,<br />

Mugger, Shredder<br />

SENSE EATERS<br />

The invention of cyberware has, over the course<br />

of the last several generations, virtually eradicated<br />

blindness and deafness in the modern world.<br />

There are occasionally cases of individuals who<br />

cannot or prefer not to have cyberware installed<br />

and remain without two of their primary senses,<br />

but most people with those sensory limitations<br />

get them remedied. This makes the attack of a<br />

178 THE CORE OF CONSCIOUSNESS >><br />

Kyle Jones (Order #16164256)


KILL CODE


KILL CODE Thanks G. If you didn’t say something, I would have.<br />

Evo accepts all kinds and they have one of the largest<br />

Deaf populations in the world. If you ever want a true<br />

and honest opinion about something, ask one of them.<br />

Which means there is a group of people with more innate<br />

resistance to a sense eater attack.<br />

> Plan 9<br />

> Can sense eaters be trained? Matt Wrath has a friend who<br />

wants to know.<br />

> Matt Wrath<br />

> Since they are relatively primitive creatures, quite<br />

possibly, but I don’t know any protosapient trainers.<br />

> Netcat<br />

> You don’t need to train them. Just box them up and then<br />

slip the box onto a host or near devices you want them to<br />

wreak havoc on.<br />

> Clockwork<br />

W L I C EDG DEPTH<br />

3 4 7 5 3 5<br />

Core Condition Monitor 10<br />

<strong>Matrix</strong> Skills Computer 4, Cybercombat 4,<br />

Electronic Warfare 6, Hacking 6<br />

Qualities<br />

Inherent Program (Decryption),<br />

Munge, Real World Naïveté<br />

Programs<br />

Armor, Cat’s Paw, Edit, Exploit,<br />

Fnord, Fork, Sneak, Stealth<br />

GLITCHES<br />

One thing that helps when you’re hunting technomancers<br />

is regular and consistent focus on your<br />

job. Glean some rumors from the masses, dig a little<br />

deeper to uncover a kernel of truth, and then set<br />

out on a globe-trotting hunt. I’ve learned to value<br />

G-Nome’s expertise with this end of the hunting process.<br />

Even though the <strong>Matrix</strong> is global, no one wants<br />

several thousand kilometers between them and a<br />

target in the modern <strong>Matrix</strong>. Signal degradation is<br />

huge and these things already have some major advantages<br />

on us—this is their turf, we just gain access<br />

through devices. Even if we don’t need one—I can<br />

access the <strong>Matrix</strong> on my own, but I might use a cyberdeck<br />

when going after some of these things, just<br />

to put some protection between them and my brain.<br />

All that said, glitches are slitches that deserve<br />

all the stitches. These damn things focus on bricking<br />

devices that connect to the <strong>Matrix</strong>. If it has a<br />

wireless connection, they are going after it. No big<br />

surprise there, but it’s their style that gets me. They<br />

don’t just slam it with code, they infuse it with errors<br />

until it pretty much bricks itself. The process is<br />

similar to the gradual process of tech getting out of<br />

date. Like the commlink you bought back in 2074<br />

that runs okay, but it’s lost a step or two over the<br />

years. Or the one you bought back in 2070 that<br />

doesn’t even operate with the current system without<br />

a virtual machine between the two allowing<br />

code to be translated. The glitches expedite that<br />

slowdown process until the device just goes dark,<br />

gets stuck on the lock screen, or leaves you with the<br />

perpetual spinning beachball of doom!<br />

All the glitches we have seen—a total of six—<br />

have had different appearances based on the devices<br />

they were trying to slowburn. Each appeared<br />

as an icon for the device, or matched the persona<br />

of the device’s user, but they always appeared<br />

slightly fuzzy at the edges with lines of discoloration<br />

and disruption throughout. The appearance<br />

wasn’t static, and they changed when they moved<br />

between devices. When not attached to a device,<br />

they formed into a single stream of rainbow code<br />

that shot out through the <strong>Matrix</strong> and moved on to<br />

their next target.<br />

> After a bad flight, I did a little digging into the avionics<br />

system on our suborbital. The system was full of damaged<br />

code and operating errors. It also had an appearance like<br />

you described. I think a glitch was slowly damaging the<br />

craft, and I’m glad I got clear when I did.<br />

> Puck<br />

W L I C EDG DEPTH<br />

4 6 4 3 3 6<br />

Core Condition Monitor 10<br />

<strong>Matrix</strong> Skills Computer 6, Cybercombat 6,<br />

Electronic Warfare 5, Hacking 5<br />

Qualities<br />

Corruptor, Easily Exploitable,<br />

Inherent Program (Crash),<br />

Munge, Real World Naïveté<br />

Programs<br />

Armor, Exploit, Fork, Shredder,<br />

Stealth, Tantrum<br />

SIN EATERS<br />

These were my favorites to chase after because of<br />

the amusement I got from watching people get<br />

180 THE CORE OF CONSCIOUSNESS >><br />

Kyle Jones (Order #16164256)


KILL CODE I recommend you send your hacker ahead to scope out<br />

a crossing just like you astrally recon spots with your<br />

spellslingers. If there’s a SIN eater at a crossing, you’d best<br />

to find another route.<br />

> Traveler Jones<br />

W L I C EDG DEPTH<br />

3 4 4 5 3 6<br />

Core Condition Monitor 10<br />

<strong>Matrix</strong> Skills Computer 6, Cybercombat 4,<br />

Electronic Warfare 6, Hacking 6<br />

Qualities<br />

Inherent Program (Edit), Munge,<br />

Real World Naïveté<br />

Programs<br />

Armor, Browse, Decryption,<br />

Exploit, Fork, Stealth, Wrapper<br />

NOISESTORM<br />

This was an odd one. The noisestorm appeared to<br />

have no other purpose than to float around in the<br />

<strong>Matrix</strong> and cover large swaths of <strong>Matrix</strong> terrain<br />

with a massive storm of noise. Every device in the<br />

area is affected—they can cover areas as small as<br />

fifty meters of real space all the way up to fuzzing<br />

up entire grids. Even worse, a few have managed<br />

access to hosts, where they inflict the same phenomenon<br />

in a place that is usually free of most<br />

major noise. Efforts to attack the phenomenon<br />

have had varying results. Most report little damage<br />

to the noisestorm and no effect, but some<br />

reports indicate the noisestorm being chased off.<br />

The most common rumor is an increase in local<br />

effect after the noisestorm is attacked, as if it is<br />

retaliating for the attack.<br />

G: It’s hard to draw any real parallels across<br />

the realms of the <strong>Matrix</strong> and the astral, but<br />

noisestorms definitely appear to be similar in<br />

some ways to manastorms. There is no evidence<br />

to connect them directly, but I see them as parallel<br />

evolutionary paths, like the Tasmanian wolf and its<br />

European equivalent.<br />

W L I C EDG DEPTH<br />

4 2 2 3 2 8<br />

Core Condition Monitor 14<br />

<strong>Matrix</strong> Skills Computer 3, Cybercombat 5,<br />

Electronic Warfare 4, Hacking 4<br />

Qualities<br />

Inherent Program (Decryption),<br />

Munge, Real World Naïveté,<br />

Redundancy, Snooper<br />

Programs<br />

Armor, Encryption, Fork<br />

Notes<br />

Noisestorms travel in groups.<br />

Each one covers a small area and<br />

targets devices and personas in<br />

its vicinity. Destroying one may<br />

clear an area or open it up for<br />

other noisestorms to move over.<br />

XENOSAPIENTS<br />

THE NULL FORMS<br />

Thanks to Puck and his eye-opening view of something<br />

new and dark in the <strong>Matrix</strong>, G-Nome and I got<br />

heavily into looking for these interesting host-stealing<br />

creatures and the strange IC they seem to command.<br />

We thought maybe the IC was actually some<br />

form of generated protosapient. Simple and direct,<br />

but still not just a program. Our efforts landed us<br />

an interesting letter, one that talked all about this<br />

dark <strong>Matrix</strong> fear factory and the creepies it generated.<br />

The IC seems to be little more than a program<br />

kicked out by the Overseers—we’ll talk about them<br />

in a minute—but he named other beings, and we<br />

managed to dig into those as well. G-Nome was<br />

not happy about this, as he felt this was stepping<br />


KILL CODE ><br />

Kyle Jones (Order #16164256)


KILL CODE Had a run-in with a group of these in Atlanta. Had to call in<br />

reinforcements and still barely managed to deal with the<br />

four onsite, when I called in twice that number of friends.<br />

> Slamm-0!<br />

> You have eight friends?! I call bulldrek!<br />

> Bull<br />

W L I C EDG DEPTH<br />

2 7 2 1 3 6<br />

Core Condition Monitor: 11<br />

Limits Physical —, Mental 6, Social 6<br />

<strong>Matrix</strong> Initiative (no device) 6 + 4D6<br />

<strong>Matrix</strong> Initiative (w/device) 3 + Data Processing + 4D6<br />

Skills Computer 2, Cybercombat 8,<br />

Electronic Warfare 3, Hacking 3<br />

Qualities<br />

Bad Rep, Inherent Program<br />

(Hammer), Munge, Real World<br />

Naïveté<br />

Programs<br />

Authority, Armor, Blackout,<br />

Cascade, Cat’s Paw, Decryption,<br />

Fork, Mugger, Tantrum<br />

CLEAR-OUT<br />

The invisible enemy. Clear-Out are stealth masters<br />

and exist to do nothing more than erase data.<br />

Usually traveling in large groups, Clear-Out gain<br />

access to their targets and then proceed to wipe<br />

them clean, erasing everything in their path. We<br />

found initial traces of them as part of data loss<br />

investigations and then did some extremely exciting<br />

(and by that, I mean boring as frag) stakeouts<br />

of places with potential info on the masters<br />

of this little e-cult. They are nearly impossible to<br />

detect, but once we had erasure events in progress,<br />

we jacked our perception enhancement<br />

programs into full gear and managed to spot<br />

the nearly clear humanoid outlines. They looked<br />

something like the Black-Offs, but transparent instead<br />

of black.<br />

W L I C EDG DEPTH<br />

2 3 8 4 4 6<br />

Core Condition Monitor 10<br />

Limits Physical —, Mental 6, Social 6<br />

<strong>Matrix</strong> Initiative (no device) 16 + 4D6<br />

<strong>Matrix</strong> Initiative (w/device) 8 + Data Processing + 4D6<br />

Skills Computer 8, Cybercombat 2,<br />

Electronic Warfare 2, Hacking 6<br />

Qualities<br />

Bad Rep, Inherent Program<br />

(Edit), Low Profile, Munge, Real<br />

World Naïveté<br />

Programs<br />

Armor, Fork, Sneak, Stealth<br />

OVERSEERS<br />

These are the masters of the hosts that get seeded.<br />

They guide their lesser forms and corral the<br />

protosapients that are attracted to their seeded<br />

hosts and the vines. They are powerful foes in<br />

their own hosts and should not be taken lightly.<br />

With those brief statements made, I’ll toss out<br />

an RIP Jiggy. The man brought skills to the party<br />

and helped G-Nome and I check out one of those<br />

vine-infested hosts (a former NeoNET lab host),<br />

but he got too excited and didn’t know when it<br />

was best to run.<br />

Overseers are said to take on a form with some<br />

relation to the host they seed. Unfortunately, I<br />

have only seen one myself, and while it fit that<br />

pattern, any other evidence I have of that pattern<br />

is anecdotal.<br />


KILL CODE ><br />

Kyle Jones (Order #16164256)


KILL CODE I’ve met Grant before. He is also in charge of interviews for<br />

access to Garmonbozia along with hiring assets to delete<br />

rejections when they don’t take it well.<br />

> Netcat<br />

> All that social software is part of that second process.<br />

Plenty of runners put on a smile and nod when they<br />

get refused but then get pissed at the rejection. Grant<br />

tracks their social circle and uses some solid bio-reading<br />

equipment to check the honesty of their acceptance. To<br />

gather the data, a runner team is often hired to get the<br />

subject talking about Garmonbozia, then other members<br />

of the team hit them with biodata readers. Relatively<br />

easy work if you’ve got a decent face, but sometimes<br />

dangerous when you run across someone who really<br />

wants to protect the Garmonbozia secret in order to gain<br />

more favor and maybe earn access.<br />

> Balladeer<br />

> I appreciate the importance of keeping Garmonbozia<br />

a secret, but they popped on and deleted files on<br />

JackPoint. That’s fragging bogus and I’ll continue to<br />

allow users to call it the G-Spot instead of its full name.<br />

“To protect their secret!”<br />

> Bull<br />

> They want to frag with us for helping them? Then forget<br />

about them. Simple.<br />

> Hexatite<br />

> Not everyone on JackPoint is a white hat. We should<br />

remember that.<br />

> Kane<br />

W L I C EDG DEPTH<br />

5 3 4 4 2 4<br />

Core Condition Monitor 12<br />

<strong>Matrix</strong> Skills<br />

Computer 3, Con 6, Cybercombat<br />

4, Electronic Warfare 4, Etiquette<br />

6, Gunnery 2, Hacking 6,<br />

Intimidation 4, Negotiations 5,<br />

Software 3<br />

Qualities<br />

<strong>Code</strong>slinger (Hack on the Fly),<br />

Inherent Program (Decryption),<br />

Linguist, Perceptive,<br />

Redundancy, Trustworthy<br />

Programs<br />

Armor, Cat’s Paw, Edit, Encryption,<br />

Exploit, Fork, Guard, Hammer,<br />

Stealth<br />

HITSEC BURN<br />

Sometimes you gotta call a spade a spade. Hitsec<br />

Burn is a program so far beyond damaged that no<br />

one, not even his tragic inventor, would miss him<br />

if he were gone. Scouring the <strong>Matrix</strong> for info on<br />

this electronic assassin was tough, but everything<br />

I found just painted a blacker and blacker picture.<br />

Hitsec focuses on one thing and one thing only:<br />

eradicating and removing people from the <strong>Matrix</strong>,<br />

usually in a permanent fashion. As he also lacks<br />

any concept of morals or rules for his actions, removing<br />

a single hacker by burning down a building<br />

or crashing a suborbital isn’t out of the question.<br />

I would recommend that if you ever end up on<br />

Hitsec’s list (and finding out that you’re on the list is<br />

not that difficult, which is weird), you call in every<br />

data slicing master you can find and set a trap. It<br />

may not work—Hitsec is sly—but it’s the best option<br />

for getting two desirable results, namely: you survive,<br />

and he doesn’t. This thing needs to be erased.<br />

Operationally, Hitsec has taken jobs all over the<br />

world. Recent operations have jumped across four<br />

continents and fourteen different grids over the span<br />

of only three days. It was an effort to clean up a line of<br />

hackers that had accessed a file from MCT. Whether<br />

this was contracted or personal, I don’t know, though I<br />

lean toward the former with the megacorporate connection.<br />

The attacks covered a variety of styles includ-<br />


KILL CODE Hitsec is a pro. Collateral damage is considered as part<br />

of the way he works. It doesn’t make him any worse than<br />

half of us. In truth, with the kind of exposure and access<br />

Hitsec has managed, he might be a solid replacement<br />

here for Riser. He reminds me a lot of that drekbag,<br />

but that drekbag had a ton to teach the rest of us about<br />

surviving at any cost.<br />

> Balladeer<br />

W L I C EDG DEPTH<br />

6 4 7 5 4 9<br />

Core Condition Monitor 14<br />

<strong>Matrix</strong> Skills<br />

Computer 3, Con 8, Cybercombat<br />

9, Electronic Warfare 4, Gunnery<br />

8, Hacking 8, Intimidation 8, Pilot<br />

Aircraft 5, Pilot Ground Craft 5<br />

Qualities<br />

Inherent Program (Decryption),<br />

Perceptive, Redundancy,<br />

Snooper<br />

Programs<br />

Armor, Biofeedback, Blackout,<br />

Cascade, Cat’s Paw, Decryption,<br />

Edit, Fork, Hammer, Mugger,<br />

Sneak, Stealth, Tantrum, Tarball<br />

DERRICK OWEN<br />

SLATTERY<br />

Denver is doing some goofy stuff, and this guy is<br />

leading the charge. Currently a Denver native, he<br />

is operating at the forefront of collaborative efforts<br />

between Danielle de la Mar, Ghostwalker/Whitebird,<br />

and Erika to install the newest <strong>Matrix</strong> in Denver<br />

as a test city. Ghostwalker’s recent power grab<br />

is offering the white worm a lot of leeway in how<br />

to run his city. Among his efforts is a change in the<br />

<strong>Matrix</strong> that could drastically change the life of hackers.<br />

Derrick is looking to help because he finds the<br />

increased security and limited access style for this<br />

next <strong>Matrix</strong> adjustment a definite improvement in<br />

the lives of <strong>Matrix</strong> denizens. According to some<br />

pieces I listened to, he considers the current open<br />

<strong>Matrix</strong> akin to allowing anyone to walk into your<br />

home, but having locks on drawers or nailed-down<br />

furniture. He wants a <strong>Matrix</strong> that feels more like a<br />

home with a solid lock on the door, where once you<br />

are inside, things don’t need to be locked down—<br />

not because they aren’t valuable, but because anyone<br />

who would want to take them won’t get access.<br />

Now, we all know that hackers will always find<br />

a way, but if access is more limited and direct, they<br />

won’t be offered the full buffet.<br />

Derrick focuses on the control and coordination<br />

aspect of these new systems and has a lot<br />

of big support with Ghostwalker and de la Mar.<br />

Those are big guns in the Sixth World, both carrying<br />

momentum from their successes, rather than<br />

fighting their way back from some loss of face or<br />

loss of standing.<br />

> In the Denver shadows he goes by DOS and runs virtual<br />

meets for runners as a Mr. Johnson looking to sew a little<br />

virtual discord. Rumor is he’s the one who engineered the<br />

animosity between the Nexus and JackPoint by setting up<br />

contract hits. The money behind them was never enough<br />

to get real pros interested, but it managed to drive some<br />

solid wedges between us.<br />

> Ire<br />

> Where’d you get that data?<br />

> Glitch<br />

> I’ve been playing this game a long time and I’ve been<br />

settled in Denver for a minute. I’ve got my finger on the<br />

pulse of the Free Zone at the moment, but it’s beating fast<br />

and change is popping up at every turn. I love it!<br />

> Ire<br />

W L I C EDG DEPTH<br />

6 4 5 8 3 7<br />

Core Condition Monitor 12<br />

<strong>Matrix</strong> Skills<br />

Computer 6, Con 6, Cybercombat<br />

4, Electronic Warfare 4,<br />

Etiquette 6, Gunnery 2, Hacking<br />

4, Intimidation 6, Negotiation 8,<br />

Software 2<br />

Qualities<br />

<strong>Code</strong>slinger (Hack on the Fly),<br />

First Impression, Inherent<br />

Program (Decryption), Linguist,<br />

Perceptive, Redundancy,<br />

Trustworthy<br />

Programs<br />

Armor, Cat’s Paw, Decryption,<br />

Encryption, Exploit, Fnord, Fork,<br />

Guard, Sneak, Stealth<br />

186 THE CORE OF CONSCIOUSNESS >><br />

Kyle Jones (Order #16164256)


KILL CODE<br />

RULES<br />

INDEX<br />

COMPLEX FORMS<br />

Arc Feedback.....................................................94<br />

Bootleg Program...............................................94<br />

Causal Nexus...................................................133<br />

Dissonance Spike............................................134<br />

Force Heuristics...............................................133<br />

Host Emulator....................................................94<br />

Hyperthreading.................................................91<br />

LOTO...................................................................90<br />

Mirrored Persona..............................................95<br />

Overdrive............................................................90<br />

Pinch....................................................................95<br />

Primed Charge...................................................95<br />

Resonance Bind.................................................95<br />

Resonance Cache..............................................95<br />

Search History...................................................95<br />

Sprite Pet.............................................................91<br />

Weaken Data Bomb..........................................96<br />

Weaken Encryption...........................................96<br />

CRITTERS<br />

Ax S. Grant...................................................... 185<br />

Black-off........................................................... 182<br />

Clear-out.......................................................... 183<br />

Crocodilians.................................................... 166<br />

Derrick Owen Slattery................................... 186<br />

Dot-camel.........................................................175<br />

E-fish..................................................................175<br />

Energizer...........................................................171<br />

G33k0s..............................................................172<br />

Gef ................................................................... 169<br />

Glitches............................................................ 180<br />

Hitsec Burn...................................................... 185<br />

iPodo..................................................................170<br />

Migaloo.............................................................177<br />

Noisestorm.......................................................181<br />

Nulls.................................................................. 184<br />

Overseers........................................................ 183<br />

Pachyderms..................................................... 166<br />

Power mungers................................................178<br />

Primates........................................................... 168<br />

Ravagers...........................................................176<br />

Red spread ..................................................... 182<br />

Rovers............................................................... 182<br />

Rybbyts..............................................................173<br />

Sense eaters.....................................................178<br />

Sin eaters..........................................................181<br />

Techworms.......................................................174<br />

Testudines.........................................................167<br />

Un-grey-tful .................................................... 183<br />

Yogi................................................................... 165<br />

ECHOES<br />

Aegis..................................................................101<br />

Draining spike..................................................101<br />

Neural synergy.................................................101<br />

Predictive analytics.........................................101<br />

Resonance resistance.................................... 102<br />

The Van der Waals effect.............................. 102<br />

Will of the Resonance.................................... 102<br />

GEAR<br />

Arrowlink............................................................52<br />

Aztechnology Defender..................................63<br />

Aztechnology Shadow Warrior......................62<br />

Blue Goo IC........................................................68<br />

Booster chips.....................................................59<br />

Booster cloud.....................................................56<br />


KILL CODE >


KILL CODE


®<br />

Street fighting is only chaotic<br />

for amateurs. When you’re a pro,<br />

when you know what you’re doing,<br />

you’re precise. You know what your<br />

opponents might do, and you know ten<br />

different ways to respond. The options<br />

give you strength. They give you power.<br />

They make you dangerous enough that<br />

the smart ones on the street will know<br />

at a glance that they shouldn’ test you.<br />

The dumb ones will suffer.<br />

Street Lethal contains the data,<br />

tools, and options players need to<br />

maximize their characters’ combat<br />

skills. With briefings on the security<br />

techniques of major corporations,<br />

information on major mercenary<br />

groups and their operations, and a<br />

whole truckload of firearms options,<br />

this book has all runners need to make<br />

sure they’re the ones left standing at<br />

the end of a fight.<br />

Street Lethal is for use with<br />

<strong>Shadowrun</strong>, Fifth Edition, though<br />

much of the information on corporate<br />

security and other opponents could<br />

also be used in <strong>Shadowrun</strong>: Anarchy.<br />

FIFTH EDITION<br />

Under License From<br />

www.catalystgamelabs.com<br />

© 2018 The Topps Company, Inc. All rights reserved. <strong>Shadowrun</strong> and <strong>Matrix</strong> are registered<br />

trademarks and/or trademarks of The Topps Company, Inc., in the United States and/or<br />

other countries. Catalyst Game Labs and the Catalyst Game Labs logo are trademarks of<br />

InMediaRes Productions, LLC. Printed in China.<br />

CAT27012<br />

PRECISE<br />

POWER<br />

ADVANCED COMBAT RULES<br />

Street fighting is only chaotic for<br />

amateurs. When you’re a pro, when you<br />

know what you’re doing, you’re precise. You<br />

know what your opponents might do, and<br />

you know ten different ways to respond.<br />

The options give you strength. They give you<br />

power. They make you dangerous enough<br />

that the smart ones on the street will know<br />

at a glance that they shouldn’t test you. The<br />

dumb ones will suffer.<br />

Street Lethal contains the data, tools,<br />

and options players need to maximize<br />

their characters’ combat skills. With<br />

briefings on the security techniques of<br />

major corporations, information on major<br />

mercenary groups and their operations,<br />

and a whole truckload of firearms options,<br />

this book has all runners need to make sure<br />

they’re the ones left standing at the end of<br />

a fight.<br />

Street Lethal is for use with <strong>Shadowrun</strong>,<br />

Fifth Edition, though much of the<br />

information on corporate security and<br />

other opponents could also be used in<br />

<strong>Shadowrun</strong>: Anarchy.<br />

Kyle Jones (Order #16164256)


Kyle Jones (Order #16164256)


Kyle Jones (Order #16164256)


The <strong>Matrix</strong> is unknowable because<br />

it is infinite. There is always one<br />

more corner behind which things can<br />

hide, one more hole where secrets<br />

can be buried. Your job isn’t to know<br />

everything about the <strong>Matrix</strong>—it’s to<br />

know more than the people you are<br />

hunting. Or who are hunting you.<br />

<strong>Kill</strong> <strong>Code</strong> will help give Sixth World<br />

hackers the edge they need to stay<br />

alive and get ahead. From a guide to<br />

<strong>Matrix</strong> basics and operations to more<br />

ways to build ace deckers to dozens<br />

of new options for technomancers,<br />

the book can help everyone who tries<br />

to make their living on the <strong>Matrix</strong>,<br />

providing something to give them<br />

an edge when riding the <strong>Matrix</strong>’s<br />

datastreams. They’ll also learn about<br />

who their opposition might be—and<br />

how they might be attacked. The<br />

<strong>Matrix</strong> is full of kill codes waiting to<br />

be executed. Just as with the Sixth<br />

World’s many firearms, your job is to<br />

make sure they’re pointed in the right<br />

direction when they go off.<br />

<strong>Kill</strong> <strong>Code</strong> is an advanced <strong>Matrix</strong><br />

sourcebook for use with <strong>Shadowrun</strong>,<br />

Fifth Edition.<br />

FIFTH EDITION<br />

Under License From<br />

®<br />

www.catalystgamelabs.com<br />

© 2018 The Topps Company, Inc. All rights reserved. <strong>Shadowrun</strong> and <strong>Matrix</strong> are registered<br />

trademarks and/or trademarks of The Topps Company, Inc., in the United States and/or<br />

other countries. Catalyst Game Labs and the Catalyst Game Labs logo are trademarks of<br />

InMediaRes Productions, LLC. Printed in China.<br />

Kyle Jones (Order #16164256)

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!